1010 lines
45 KiB
Plaintext
1010 lines
45 KiB
Plaintext
|
||
|
||
|
||
|
||
NISTIR 90-4228
|
||
|
||
|
||
|
||
|
||
|
||
PROTOTYPING SP4
|
||
A SECURE DATA NETWORK SYSTEM TRANSPORT PROTOCOL
|
||
INTEROPERABILITY DEMONSTRATION PROJECT
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
Charles Dinkel, Noel Nazario, and Robert Rosenthal
|
||
Computer Security Division
|
||
National Computer Systems Laboratory
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, MD 20899
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
TABLE OF CONTENTS
|
||
|
||
|
||
ABSTRACT . . . . . . . . . . . . . . . . . . . . . . . . . . . 1
|
||
|
||
PREFACE. . . . . . . . . . . . . . . . . . . . . . . . . . . . 2
|
||
|
||
1. PROJECT SUMMARY. . . . . . . . . . . . . . . . . . . . . . 3
|
||
1.1 Computer Network Security - Why Needed?. . . . . . . 3
|
||
1.2 Why Security at Layer 4 (SP4)? . . . . . . . . . . . 3
|
||
1.3 NIST's OSI Security Laboratory . . . . . . . . . . . 3
|
||
1.4 Results. . . . . . . . . . . . . . . . . . . . . . . 4
|
||
1.5 Future Work. . . . . . . . . . . . . . . . . . . . . 4
|
||
|
||
2. INTRODUCTION. . . . . . . . . . . . . . . . . . . . . . . 5
|
||
|
||
3. BACKGROUND INFORMATION FOR SP4. . . . . . . . . . . . . . 6
|
||
|
||
4. SP4 INTEROPERABILITY PROJECT DESCRIPTION. . . . . . . . . 7
|
||
4.1 GOSIP Security . . . . . . . . . . . . . . . . . . . 7
|
||
4.2 The Secure Data Network System (SDNS) Project at
|
||
NIST . . . . . . . . . . . . . . . . . . . . . . . . 7
|
||
4.3 SDNS Status. . . . . . . . . . . . . . . . . . . . . 9
|
||
4.4 SP4 Protocol Development . . . . . . . . . . . . . . 11
|
||
|
||
5. OSI SECURITY LABORATORY PROGRAM . . . . . . . . . . . . . 12
|
||
|
||
6. SP4 INTEROPERABILITY TESTING. . . . . . . . . . . . . . . 14
|
||
6.1 Establishing the SP4 Laboratory. . . . . . . . . . . 14
|
||
|
||
7. VENDOR IMPLEMENTATIONS OF SP4 . . . . . . . . . . . . . . 16
|
||
7.1 IBM SP4 Implementation - Description and Features. . 16
|
||
7.2 Digital Equipment Corporation SP4 Implementation -
|
||
Description and Features . . . . . . . . . . . . . . 17
|
||
7.3 Hughes Aircraft Company SP4 Implementation - Description
|
||
and Features . . . . . . . . . . . . . . . . . . . . 18
|
||
|
||
8. RESULTS OF LABORATORY TESTING OF SP4 PROTOTYPES . . . . . 20
|
||
8.1 SP4 Interoperability Demonstration . . . . . . . . . 20
|
||
8.2 Hughes/Digital Interoperability Demonstration. . . . 20
|
||
8.3 IBM Interoperability Demonstration . . . . . . . . . 20
|
||
8.4 Alignment of SP4 Implementations . . . . . . . . . . 21
|
||
|
||
9. CONCLUSIONS . . . . . . . . . . . . . . . . . . . . . . . 22
|
||
|
||
10. FUTURE SP4 EFFORTS. . . . . . . . . . . . . . . . . . . . 23
|
||
10.1 NIST SP4 Reference Implementation and Conformance Test
|
||
Methodology. . . . . . . . . . . . . . . . . . . . . 23
|
||
|
||
LIST OF ABBREVIATIONS. . . . . . . . . . . . . . . . . . . . . 24
|
||
|
||
REFERENCES . . . . . . . . . . . . . . . . . . . . . . . . . . 25
|
||
|
||
APPENDIX 1 OSI SECURITY LABORATORY MILESTONES . . . . . . . . 26
|
||
|
||
APPENDIX 2 OSI SECURITY LAB GUIDELINES. . . . . . . . . . . . 28
|
||
|
||
APPENDIX 3 NIST SP4 DEMONSTRATION AGREEMENTS. . . . . . . . . 29
|
||
|
||
|
||
|
||
PROTOTYPING SP4
|
||
A SECURE DATA NETWORK SYSTEM TRANSPORT PROTOCOL
|
||
INTEROPERABILITY DEMONSTRATION PROJECT
|
||
|
||
|
||
|
||
|
||
Charles Dinkel, Noel Nazario, and Robert Rosenthal
|
||
Computer Security Division
|
||
National Computer Systems Laboratory
|
||
National Institute of Standards and Technology
|
||
Gaithersburg, Maryland 20899
|
||
|
||
|
||
|
||
|
||
ABSTRACT
|
||
|
||
The NIST Secure Data Network System (SDNS) project implements
|
||
computer to computer communications security for distributed applications.
|
||
The internationally accepted Open Systems Interconnection (OSI) computer
|
||
networking architecture provides the framework for SDNS, which is a project
|
||
of the National Security Agency (NSA). SDNS utilizes the layering principles
|
||
of OSI to implement secure data transfers between computer nodes of local
|
||
area and wide area networks. SDNS implements SP4, a security protocol at
|
||
the OSI Transport layer (layer 4) that provides end-to-end reliable
|
||
transparent data communications with confidentiality and integrity security
|
||
services. Laboratory prototypes of SP4 formed the basis of proposed
|
||
voluntary national standards and will form the basis for future security
|
||
enhancements for the Government Open Systems Interconnection Profile
|
||
(GOSIP).
|
||
|
||
KEY WORDS
|
||
|
||
Computer security, conformance testing, local area networks (LAN), network
|
||
security, protocol security, SDNS, transport protocols
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
The mention of certain vendor products in this report in no way implies
|
||
endorsement or recommendation of any kind.
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
PREFACE
|
||
|
||
|
||
The Computer Security Act of 1987 (P.L. 100-235), focuses
|
||
attention on the need to protect sensitive government
|
||
information. The National Institute of Standards and
|
||
Technology (NIST) is assigned the responsibility for
|
||
developing standards and guidelines to improve the
|
||
Federal Government's management and use of computer
|
||
and related telecommunications systems. Included in this
|
||
effort is developing cost-effective security mechanisms for
|
||
providing privacy and security of sensitive information in
|
||
Federal computer systems.
|
||
|
||
In addition to its responsibilities for the development of
|
||
standards and guidelines, NIST's National Computer
|
||
Systems Laboratory (NCSL) provides technical assistance
|
||
to federal agencies and conducts a program of research.
|
||
This program supports both standards development and
|
||
technical assistance, and includes the development of test
|
||
methods, the conduct of laboratory based activities, and
|
||
collaborative research with other organizations.
|
||
|
||
In all areas of standards development, NIST has adopted
|
||
the approach of working closely within the voluntary
|
||
standards community to encourage National and
|
||
international standards that meet the requirements of the
|
||
U.S. Federal Government. The networking standards
|
||
community bases its work on the International Standard
|
||
Organization's (ISO) Basic Reference Model for Open
|
||
Systems Interconnection (OSI). This model, recognized
|
||
internationally as a framework under which computer-to-
|
||
computer communications protocols are developed, forms
|
||
the basis for NIST's standards development and
|
||
implementations activities for computer networks.
|
||
|
||
|
||
|
||
1. PROJECT SUMMARY
|
||
|
||
|
||
1.1 Computer Network Security - Why Needed?
|
||
|
||
The Open Systems Interconnection (OSI) standards being adopted by
|
||
government and industry make it possible to interconnect computer systems
|
||
manufactured by different vendors. Maintaining the confidentiality, integrity,
|
||
and availability of data transmitted between these interconnected computers
|
||
poses new problems. Users of networked computers need assurance that the
|
||
systems with which they are communicating are not only "open", but also
|
||
secure from unauthorized modifications, undetected loss, and unauthorized
|
||
disclosure. Standard security protocols must provide for the verification of
|
||
the identities of both the senders and receivers of data to ensure that
|
||
computers and connecting communications are secure.
|
||
|
||
1.2 Why Security at Layer 4 (SP4)?
|
||
|
||
The Transport layer of the 7-layer OSI model provides reliable end-to-end
|
||
transparent data communications through a network. The Transport layer
|
||
security protocol (SP4) provides confidentiality and integrity services to data
|
||
being transmitted between computers. NIST decided to focus initial network
|
||
security work at layer 4 for several important reasons:
|
||
|
||
a. Security at the Transport layer (SP4) is independent of network
|
||
technology
|
||
|
||
b. The security protocols developed for the transport layer had
|
||
matured to the point where vendors could begin building prototype
|
||
implementations.
|
||
|
||
c. SP4 had the potential to become a government and industry
|
||
standard.
|
||
|
||
|
||
1.3 NIST's OSI Security Laboratory
|
||
|
||
The OSI Security Laboratory was established to provide a resource where
|
||
interested researchers from government and industry can experiment with
|
||
new network security ideas. Three vendors, Digital Equipment Corporation,
|
||
IBM, and Hughes Aircraft Company are currently using the laboratory to test
|
||
and demonstrate a subset of the Transport Layer security protocols (SP4).
|
||
|
||
1.4 Results
|
||
|
||
a. Interoperability of the Hughes and Digital prototype SP4
|
||
implementations has been achieved.
|
||
|
||
b. The success of the NIST project prompted NSA to release ten
|
||
Secure Data Network System (SDNS) documents for public review.
|
||
|
||
c. The SP4 protocol specification has been accepted by the American
|
||
National Standards Institute (ANSI) as a New Work Item.
|
||
|
||
1.5 Future Work
|
||
|
||
The results achieved in the OSI Security Laboratory demonstration of SP4
|
||
justify follow-up work. NIST is planning to develop a reference
|
||
implementation of SP4 and related conformance test methodologies and to
|
||
initiate work in the area of Key Management. The use of labels in SP4 is
|
||
another item that is under investigation. Integrated Services Digital Networks
|
||
(ISDN) security activities may lead to the establishment of an OSI/ISDN
|
||
security laboratory.
|
||
|
||
|
||
|
||
2. INTRODUCTION
|
||
|
||
|
||
This report describes the results of work that NIST completed as part of its
|
||
commitment to provide solutions and develop standards for, computer
|
||
network security. The approach that NIST adopted was to work in
|
||
partnership with the National Security Agency (NSA) and industry to
|
||
demonstrate security at the Transport layer of the OSI model.
|
||
|
||
NIST is active in developing federal, national and international security
|
||
standards based on laboratory results in network security. An OSI Security
|
||
Laboratory was established to permit engineers from NIST, IBM, Digital and
|
||
Hughes to cooperatively develop prototype implementations of Transport
|
||
layer security protocols (SP4). Interoperability demonstrations of the SP4
|
||
implementations provided by the three vendors were conducted in the
|
||
laboratory. An important goal of this effort is to develop commercial
|
||
markets for security products based on U.S. Government and industry
|
||
requirements.
|
||
|
||
|
||
|
||
3. BACKGROUND INFORMATION FOR SP4
|
||
|
||
|
||
The Security Protocol at Layer 4 of the OSI 7-layer architecture is called
|
||
SP4. The OSI architecture is defined by International Standard IS-7498, a
|
||
document issued by the International Organization for Standardization (ISO).
|
||
The SP4 protocol document is based on the Security Architecture addendum
|
||
to OSI, IS-7498/2. SP4 provides Integrity and Confidentiality services at the
|
||
bottom of the Transport Layer (layer 4), right on top of the Network Layer
|
||
(layer 3).
|
||
|
||
Layer 4 is the first place in the OSI architecture where reliable end-to-end
|
||
connections are established. All the addressing information in layer 3 and
|
||
below remains in the clear. For this reason SP4 can provide transparent
|
||
protection regardless of the type of network used; e.g. wide area or local
|
||
area.
|
||
|
||
SP4 makes no assumptions about the encryption algorithm(s) used. It also
|
||
assumes that some other trusted entity is responsible for providing pairwise
|
||
cryptographic associations that support local security policies.
|
||
|
||
SP4 takes the information from layer 4 and above and encapsulates it. If the
|
||
Integrity Service is requested, the encapsulation consists of a cryptographic
|
||
checksum performed over all the information from Transport and above.
|
||
The result of the checksum is appended to the end of the packet. If
|
||
Confidentiality is requested, the packet plus the integrity checksum, if present,
|
||
is encrypted.
|
||
|
||
There are two major options in SP4; SP4-E and SP4-C. SP4-E stands for
|
||
"End-to-End" SP4 protection. This option provides a single cryptographic
|
||
association to protect all communications between any pair of end systems.
|
||
The E option supports a connectionless security service as described in IS-
|
||
7498/2. SP4-E provides protection for either connection-oriented or
|
||
connectionless Transport.
|
||
|
||
SP4-C is "Connection-oriented" SP4 protection. Under this option every
|
||
Transport connection is protected by an individual cryptographic association.
|
||
It provides a finer key granularity than SP4-E. This is a connection-oriented
|
||
security service as specified in IS-7498/2. SP4-C protection can only be
|
||
provided when a connection-oriented Transport service is available.
|
||
|
||
|
||
|
||
4. SP4 INTEROPERABILITY PROJECT DESCRIPTION
|
||
|
||
|
||
4.1 GOSIP Security
|
||
|
||
The Government Open Systems Interconnection Profile (GOSIP), FIPS 146,
|
||
identifies standard OSI network protocols and specific options for use in
|
||
federal Government distributed computer network applications. Taken
|
||
together, these standard protocols and options form a profile. Today, GOSIP
|
||
does not include a security profile, but does includes a chapter on security
|
||
that provide for a security label consistent with the Internet Protocol Security
|
||
Option. The appendix to GOSIP identifies security as the highest priority
|
||
advanced requirement for future versions of GOSIP.
|
||
|
||
NIST works with the National Security Agency (NSA) and industry to bring
|
||
proposals for security technology standards to the voluntary standards
|
||
community. The goal is to develop internationally accepted standards that
|
||
can be implemented in network security products, that meet the U.S.
|
||
Government's security requirements and can be marketed internationally by
|
||
U.S. industry. The GOSIP security profiles will reflect these international
|
||
standards where appropriate.
|
||
|
||
4.2 The Secure Data Network System (SDNS) Project at NIST
|
||
|
||
At the present time there are no base standards for computer network
|
||
security. One of NIST's objectives in participating in the SDNS project was
|
||
to assist in developing a framework of base standards for security. Working
|
||
with IBM, Digital and Hughes, NIST was able to develop a set of agreements
|
||
for demonstrating the interoperability of SP4 prototype implementations.
|
||
|
||
The SP4 protocol specification has been modified and updated as a result of
|
||
work accomplished in the NIST OSI Security Laboratory. This specification
|
||
has been submitted to ANSI where it is expected it will serve as the basis for
|
||
a national, and eventually, an international (ISO) standard for security. Once
|
||
base standards for security exist, these can be submitted to the NIST
|
||
Workshop for Implementors of OSI to begin the process of establishing stable
|
||
implementation agreements. These agreements often serve as catalysts to the
|
||
development and marketing of actual vendor products.
|
||
|
||
While it is recognized that detailed security mechanisms would differ for
|
||
classified and unclassified applications, both would benefit from a common
|
||
security foundation. The OSI Basic Reference Model provides the
|
||
foundation. Through participation in the Secure Data Network System
|
||
(SDNS) project of the National Security Agency, NIST expects to exploit the
|
||
potential economic benefits derived from standardizing security built on that
|
||
foundation. NIST's SDNS activities will help define the architecture and
|
||
protocols within the framework of the OSI computer network model to
|
||
provide data communications with security. In addition, requirements for a
|
||
key management system will be specified and vendors encouraged to develop
|
||
interoperable equipments that implement SDNS Protocols.
|
||
|
||
Three phases of the SDNS project were defined. Phase 1, completed in mid
|
||
1987, developed a security architecture based on the OSI model and defined
|
||
a key management system for use on commercial data networks.
|
||
|
||
Phase 1A, focused on the development of protocols for Phase 1.
|
||
|
||
Phase 2 will result in a family of low cost interoperable off-the-shelf security
|
||
products for use in personal computers, micro and mini-computers, modems
|
||
and host computers. These devices will provide protection for local area
|
||
networks (LANS), electronic mail (E-Mail), and public and private data
|
||
networks.
|
||
4.3 SDNS Status
|
||
|
||
NIST has taken an active role in national and international standards
|
||
activities for computer networks; and at industry's request, NIST sponsors the
|
||
NIST Workshop for Implementors of Open Systems Interconnection.
|
||
Workshop documents record stable implementation agreements of OSI
|
||
protocols among the organizations participating in the NIST Workshop. The
|
||
Workshop's Special Interest Group on Security has reviewed the SDNS
|
||
documents dealing with security protocols at layer 3 (SP3) and at layer 4
|
||
(SP4). Current work involves defining the security services and information
|
||
that must be provided by a Key Management System to SP4.
|
||
|
||
The dotted lines in Figure 1 illustrate the possible locations for security
|
||
protocols in the GOSIP, FIPS 146. NIST's computer network security
|
||
standards activity focuses on development of security profiles that include
|
||
SP3, SP4, security management, security for electronic mail (X.400), and
|
||
possibly SP2 security.
|
||
|
||
In April 1989, NSA released the SP4 specification into the public domain.
|
||
The ANSI committee responsible for data communications (X3S3.3) reviewed
|
||
the SP4 document during its April 1989 meeting and approved it for
|
||
placement as a New Work Item for ISO standardization. This contribution
|
||
serves as base text for use in preparation of Addenda to the ISO 8073 (OSI
|
||
Connection Oriented Transport Protocol Specification) and ISO 8602 (OSI
|
||
Connectionless Transport Service) documents.
|
||
|
||
The following SDNS documents have also been released for public review:
|
||
|
||
SDNS.301 - Security Protocol 3 (SP3)
|
||
SDNS.601 - Key Management Profile - Communication Protocol
|
||
Requirements for Support of the SDNS Key Management
|
||
Protocol
|
||
SDNS.701 - Message Security Protocol
|
||
SDNS.702 - SDNS Directory Specifications for Utilization with the SDNS
|
||
Message Security Protocol
|
||
SDNS.801 - Access Control Documents
|
||
SDNS.802 - Access Control Specification
|
||
SDNS.902 - Key Management Protocol - Definition of Services Provided
|
||
by the Key Management Application Service Element
|
||
SDNS.903 - Key Management Protocol - Specification of the Protocol for
|
||
Services Provided by the Key Management Application Service
|
||
Element
|
||
SDNS.906 - Key Management Protocol - SDNS Traffic Key Attribute
|
||
Negotiation
|
||
|
||
|
||
4.4 SP4 Protocol Development
|
||
|
||
SDNS SP4 Implementors Meetings were held approximately every two months
|
||
at NIST. During these meetings, the participants, representatives from IBM,
|
||
Hughes, and Digital, met with NIST engineers and reviewed the status of the
|
||
SP4 implementations, updated the set of Demonstration Agreements, and
|
||
recommended changes and corrections to implementations in the laboratory.
|
||
The Demonstration Agreements were a subset of the SP4 protocol
|
||
specifications that the three vendors agreed to implement in their prototypes.
|
||
Appendix 3. is an outline of those agreements.
|
||
|
||
Laboratory sessions permitted the vendor representatives to discover
|
||
differences and "bugs" that prevented their SP4 implementations from
|
||
interoperating. Information from this work was reviewed at the SP4 Protocols
|
||
Meeting and agreements modified and/or confirmed. This allowed the
|
||
vendors to return to the laboratory with a clearer understanding of what had
|
||
to be done to their hardware and software to achieve interoperability.
|
||
|
||
|
||
|
||
5. OSI SECURITY LABORATORY PROGRAM
|
||
|
||
|
||
NIST's OSI Security Laboratory was established as a direct result of a
|
||
recognized need for improved computer network security. Current research
|
||
focuses on security at the Transport Layer (SP4), where reliable end system
|
||
computer to end system computer communications is provided.
|
||
|
||
The objectives of NIST's OSI Security Laboratory Program are:
|
||
|
||
Develop OSI security standards that would be useful in government
|
||
and commercial applications;
|
||
|
||
Develop and perform interoperability demonstrations of OSI security
|
||
equipment;
|
||
|
||
Develop automated conformance testing methodologies for the
|
||
standards;
|
||
|
||
Develop conformance tests of security devices implementing the
|
||
standards;
|
||
|
||
Maintain compatibility between the public OSI security standards
|
||
and the Secure Data Network Systems (SDNS) specifications.
|
||
|
||
Stimulate the development of commercial products compatible with
|
||
OSI standards
|
||
|
||
Figure 2 illustrates the laboratory layout and the configuration for the
|
||
computers that are participating in the SP4 interoperability tests. The NIST
|
||
IEEE 802.3 local area network extends through a gateway to OSINET.
|
||
|
||
Appendix 1 lists the milestones met in developing the laboratory.
|
||
|
||
Appendix 2 is a list of the guidelines for use of the OSI Security Laboratory
|
||
proposed by NIST and agreed to by the SP4 vendors.
|
||
|
||
|
||
|
||
6. SP4 INTEROPERABILITY TESTING
|
||
|
||
|
||
6.1 Establishing the SP4 Laboratory
|
||
|
||
IBM, Hughes Aircraft Company and Digital Equipment Corporation (SDNS
|
||
contractors for SP4) agreed to provide NIST with the following:
|
||
|
||
A duplicate of the prototype SP4 development system that was being
|
||
used for Phase IA of the SDNS project.
|
||
|
||
Copies of the software and source code being used for its
|
||
implementation.
|
||
|
||
A commitment of time from a person or persons knowledgeable of
|
||
the implementation (hardware and software) to participate in
|
||
defining the interoperability demonstration, modify the software to
|
||
perform the demonstrations, and assist NIST in performing the initial
|
||
demonstrations.
|
||
|
||
A fourth company, Sun Microsystems Inc., (not an SDNS contractor)
|
||
provided NIST with a model 3/280 micro computer system and source code
|
||
for the SunLink OSI software. Throughout this project Sun Microsystems has
|
||
furnished technical support as well as upgrades to their software products
|
||
when new releases were issued.
|
||
|
||
|
||
NIST engineers installed the cabling required for an IEEE 802.3 bus utilizing
|
||
Carrier Sense Multiple Access with Collision Detection (CSMA/CD) as the
|
||
access method. This local area network (LAN) was configured as a
|
||
subnetwork of the main computer network spanning the NIST campus.
|
||
|
||
Two Sun computers, a model 3/280 on loan from the company and a model
|
||
3/50 Workstation owned by NIST were the first machines connected to the
|
||
laboratory subnetwork. The 3/280 was delivered with two 575 megabyte disk
|
||
drives, a 10 1/2 inch magnetic tape drive, and a color monitor. This computer
|
||
was configured as the gateway between the laboratory subnetwork and the
|
||
NIST network.
|
||
|
||
Sun provided NIST with version 3.5 of the Sun Operating System and version
|
||
5.2 of the SunLink OSI Source Code. Under the software licensing
|
||
agreement Sun Microsystems had approved a NIST request that it be
|
||
permitted to modify the OSI code to include Transport Layer security.
|
||
Two IBM RISC Technology Personal Computers (RT/PC) were delivered to
|
||
NIST in November 1988. Engineers from IBM assisted NIST personnel in
|
||
installing the units and connecting them to the 802.3 subnetwork in the
|
||
laboratory. Documentation needed to operate the PC's and run the SP4
|
||
demonstration test scripts was furnished by IBM.
|
||
|
||
In January 1989 Digital Equipment Corporation and Hughes Aircraft
|
||
Company provided computer hardware, software and documentation required
|
||
to demonstrate their versions of the SP4 protocols. Shortly thereafter, all
|
||
three vendors met with NIST engineers to begin the process of demonstrating
|
||
interoperability.
|
||
|
||
|
||
|
||
7. VENDOR IMPLEMENTATIONS OF SP4
|
||
|
||
|
||
Three vendors, Digital, IBM, and Hughes agreed to participate in the NIST
|
||
SP4 Interoperability Project. A brief description of each vendor's prototype
|
||
implementation follows.
|
||
|
||
7.1 IBM SP4 Implementation - Description and Features
|
||
|
||
The IBM implementation of SP4 was developed as part of the IBM-funded
|
||
ARGO project at the University of Wisconsin. The overall objective of the
|
||
ARGO project was to implement a suite of computer networking software
|
||
based on the international standards for Open System Interconnection. The
|
||
software was designed to run on an IBM RT/PC model 125 computer
|
||
workstation using a version of the 4.3 BSD Unix operating system. The IBM
|
||
SP4 prototype developed as part of the ARGO project incorporates part of
|
||
the set of SDNS standards and protocols designed to provide secure
|
||
communications in an OSI environment.
|
||
|
||
The subset of SP4 features implemented in the IBM RT/PC's includes:
|
||
|
||
SP4-C
|
||
Full-software implementation of SP4
|
||
Full OSI stacks
|
||
XOR cryptography
|
||
OSI over TCP addressing
|
||
Access control mechanism
|
||
Security parameter negotiation
|
||
Simulations of certain malicious attacks
|
||
|
||
The Key Management Protocol (KMP) services related to the exchange of
|
||
credentials and the traffic encryption key attributes were implemented by
|
||
IBM. However, those services that required the existence of a Key
|
||
Management Center (KMC), such as retrieval of the Compromised Key List,
|
||
were not implemented. Instead, stub interfaces to those portions of the
|
||
protocol were provided.
|
||
|
||
The transport layer on which the IBM SP4 prototype is based contains the
|
||
connection-oriented transport service. Within the connection-oriented
|
||
transport entity, only classes 0 and 4 of the ISO transport protocol are
|
||
implemented. The IBM prototype implements the Security Encapsulation
|
||
function, the Data Encipherment function (confidentiality), the Integrity
|
||
function (unique sequence numbers, final sequence numbers, direction
|
||
indication), the Security Label function (single security labels only) and the
|
||
Security Padding function.
|
||
|
||
In the IBM prototype a simple key creation device is simulated by software.
|
||
A data base for the storage of traffic encryption keys is also implemented.
|
||
|
||
Access control is provided by the IBM system. Whenever access control
|
||
decisions are necessary, a stub procedure, which queries an operator for a yes
|
||
or no decision is used. The access control functions supported in this way
|
||
include:
|
||
|
||
The determination of security options, permissible security levels,
|
||
security labels, and traffic encryption key attributes proposed by the
|
||
initiator of a cryptographic association between two SDNS users;
|
||
|
||
The selection of the same items by the responder of a cryptographic
|
||
association between two SDNS users.
|
||
|
||
The security options sets supported by the IBM prototype are:
|
||
|
||
Confidentiality
|
||
|
||
Integrity
|
||
|
||
Confidentiality and integrity
|
||
|
||
For these option sets key granularity per-transport-connection or per end
|
||
system can be selected. The cryptographic algorithm provided by the IBM
|
||
prototype is a "exclusive OR" (XOR) function.
|
||
|
||
7.2 Digital Equipment Corporation SP4 Implementation - Description and
|
||
Features
|
||
|
||
Digital's SP4 prototype implementation was created by modifying an existing
|
||
product called a Digital Ethernet Secure Network Controller (DESNC).
|
||
These controllers are external encryption devices. A standard DESNC
|
||
performs DES (FIPS PUB46-1) encryption at layer 2. The modified DESNCs
|
||
implement SP4-E connectionless security services and incorporate a procedure
|
||
to negotiate cryptographic associations. At least one VAX Station node is
|
||
required to control the security devices on the LAN.
|
||
|
||
The controlling VAX node contains a database with information about the
|
||
encryption devices and the network configuration. It contains the names of
|
||
the encryption devices, their network addresses, date of modification, the
|
||
name of the firmware image being run, and the type of audit conducted. The
|
||
information in the database is loaded into the devices to control their
|
||
operation and set alarms to flag relevant events. A system administrator can
|
||
review information in the database and reports from the DESNCs to detect
|
||
unauthorized modification.
|
||
A DESNC can be used to furnish security services to non-Digital hosts as
|
||
well. In the OSI Security Laboratory, a DESNC is used to provide
|
||
transparent OSI security services to a Sun model 3/50 workstation. Because
|
||
the DESNC is able to distinguish between OSI and non-OSI data packets, it
|
||
can encrypt OSI data without interfering with any other network traffic.
|
||
|
||
SP4 features implemented by Digital in their prototype device include:
|
||
|
||
SP4-E
|
||
External device controlled by a Vax node on the LAN
|
||
Hardware DES cryptography
|
||
Messaging application on top of TP4
|
||
OSINET addressing
|
||
Peer address checking
|
||
Simple key management scheme
|
||
|
||
7.3 Hughes Aircraft Company SP4 Implementation - Description and
|
||
Features
|
||
|
||
The Hughes prototype SP4 device is implemented as an embedded intelligent
|
||
communications controller capable of being installed in a variety of
|
||
workstations. The prototype used in the OSI Security Laboratory is installed
|
||
in a model 286 Personal Computer.
|
||
|
||
The embedded intelligent communications controller card performs all the
|
||
communications protocol processing as well as providing a hardware
|
||
implemented cryptographic function, ie. DES.
|
||
|
||
The controller board consists of an 80286 microprocessor running in protected
|
||
mode, 512K bytes of DRAM, a subnetwork interface (IEEE 802.3 or ethernet
|
||
in the current version) and an embedded cryptographic device. A multi-
|
||
tasking real-time protected mode operating system is provided for the board.
|
||
Under this operating system, protocol and cryptographic software functions
|
||
can be implemented as individual tasks which enforce process isolation.
|
||
The Hughes prototype SP4 device is based on version 1.2 (dated 07/12/88) of
|
||
the SP4 specification and implements the SP4-E option.
|
||
|
||
The following features of the SP4 security protocols are also implemented:
|
||
|
||
SP4-E
|
||
On-board hardware card with dedicated 80286 microprocessor
|
||
operating in protected mode, DES hardware, and IEEE 802.3
|
||
implementation
|
||
Messaging application on top of TP4
|
||
OSINET addressing
|
||
Peer address checking
|
||
Simple key management scheme
|
||
|
||
The data encipherment function chosen for the Hughes prototype SP4 device
|
||
is the DES algorithm. Process isolation keeps the actual key value out of
|
||
user process space.
|
||
|
||
The Hughes prototype SP4 device implements a Key Management Protocol.
|
||
This protocol allows for an electronic key management in which the two end-
|
||
systems desiring to communicate first authenticate themselves to each other.
|
||
Both create the same pairwise traffic encryption key, and then negotiate the
|
||
security services that they will use on information protected using that key.
|
||
|
||
|
||
|
||
8. RESULTS OF LABORATORY TESTING OF SP4 PROTOTYPES
|
||
|
||
|
||
8.1 SP4 Interoperability Demonstration
|
||
|
||
In the OSI Security Laboratory the feasibility of secure OSI was demonstrated
|
||
by using SP4. Digital, IBM, and Hughes each chose a different method for
|
||
implementing the SP4 protocols. IBM selected a software approach. The
|
||
DESNC device used by Digital is hardware. Hughes' technique involved both
|
||
hardware and software. The variety in approaches clearly demonstrated the
|
||
implementation independence and flexibility of the SP4 protocol specification.
|
||
|
||
The focus of the SP4 interoperability demonstration was on providing integrity
|
||
and confidentiality security services over an unprotected network. Related
|
||
issues, such as key management and cryptography, though very important with
|
||
respect to achieving interoperability, are not covered in the SP4 specification,
|
||
but in other SDNS documents.
|
||
|
||
8.2 Hughes/Digital Interoperability Demonstration
|
||
|
||
Interoperability of the Hughes and Digital implementations of SP4 was
|
||
achieved in the OSI Security Laboratory. Both systems use the OSINET
|
||
addressing scheme specified in the GOSIP agreements, the same protocol
|
||
exchange to obtain keys, support integrity and confidentiality services using
|
||
the Data Encryption Standard (DES) in the Cipher Block Chain Mode, and
|
||
the SP4-E option of the standard.
|
||
|
||
Digital and Hughes implemented the first three layers of the OSI architecture
|
||
stack plus SP4 and Transport Class 4 (TP4). An application for message
|
||
handling was provided directly on top of TP4.
|
||
|
||
8.3 IBM Interoperability Demonstration
|
||
|
||
IBM implemented all seven layers of the OSI model in software. They chose
|
||
to use the SP4-C option of the specification. A stub procedure was used to
|
||
provide access control and service negotiation security. The application
|
||
programs provided by IBM run in the X-Windows environment.
|
||
It was not possible to achieve interoperability between the IBM and either
|
||
the Digital or Hughes versions of SP4 for several reasons. IBM based its
|
||
implementation on an earlier version of the SP4 specification. IBM's
|
||
addressing scheme uses OSI over TCP (Transport Control Protocol) rather
|
||
than OSINET addressing. Other differences are with the Key Management
|
||
Application and the cryptographic algorithm used. For demonstration
|
||
purposes IBM used an XOR function rather than the DES algorithm used
|
||
by the other two vendors.
|
||
|
||
8.4 Alignment of SP4 Implementations
|
||
|
||
In June 1989, NIST and the vendors met to identify how each of the three
|
||
SP4 implementations mapped onto version 1.2 of the SP4 specification
|
||
document. Issues that prevented interoperability, recommended changes to
|
||
each vendor's prototype to achieve alignment and alternatives were outlined.
|
||
Because this effort was beyond the scope of work originally agreed to, the
|
||
vendors were not able to commit the resources required to make
|
||
modifications to their SP4 implementations. Since a strategy leading to
|
||
interoperability of the Digital, Hughes and IBM implementations has been
|
||
developed, NIST has encouraged the vendors to complete this objective
|
||
during the 1990 fiscal year and has offered continuing laboratory support.
|
||
|
||
|
||
|
||
|
||
9. CONCLUSIONS
|
||
|
||
|
||
The OSI Security Laboratory has proven to be successful as a resource where
|
||
interested researchers from government, and industry, can experiment with
|
||
new ideas in network security, try new approaches for common problems, and
|
||
develop new solutions. The laboratory provided a neutral working
|
||
environment that fostered cooperation among the three vendors and ensured
|
||
the integrity of the experiment. The vendors, Digital Equipment Corporation,
|
||
IBM, and Hughes Aircraft Company are currently using the laboratory to test
|
||
and demonstrate a subset of the Transport Layer security protocols (SP4).
|
||
|
||
Interoperability of the Hughes and Digital SP4 implementations has been
|
||
achieved. IBM's SP4 prototype was designed using an earlier version of the
|
||
specification. NSCL has proposed that all three vendors align their
|
||
prototypes with the most recent version of the SP4 document as the approach
|
||
for achieving interoperability.
|
||
|
||
The laboratory exercise, with actual implementations of SP4, has assisted
|
||
NIST in its efforts to advance this technology in the voluntary standards
|
||
community. Through its involvement in national and international standards
|
||
organizations, NIST assisted the X3S3.3 committee of the American National
|
||
Standards Institute (ANSI) adopt the SP4 specification as a New Work Item.
|
||
It is felt that this process will lead to base standards in security that can be
|
||
brought into the GOSIP arena for approval as stable implementors
|
||
agreements.
|
||
|
||
The National Security Agency (NSA) has released the SP4 specification for
|
||
public review. Additional SDNS documents have also been released.
|
||
Through its partnership with NSA, NIST will review these protocol documents
|
||
and where appropriate take the necessary action to have them adopted as
|
||
Federal Information Processing Standards (FIPS).
|
||
|
||
Although current efforts in the OSI Security Laboratory focus on Transport
|
||
Layer security, it is possible that future work will involve Network Layer
|
||
security (SP3), and Integrated Services Digital Networks (ISDN) security.
|
||
Preliminary discussions have been held with vendors who have expressed an
|
||
interest in implementing SP3. ISDN activities may result in the establishment
|
||
of a joint OSI/ISDN security laboratory. Work in the areas of key
|
||
management and labels is also proposed.
|
||
|
||
|
||
|
||
10. FUTURE SP4 EFFORTS
|
||
|
||
|
||
10.1NIST SP4 Reference Implementation and Conformance Test
|
||
Methodology
|
||
|
||
One of the objectives of NIST's work in Transport Layer security is to
|
||
develop an SP4 reference implementation. A Formal Description Language
|
||
(FDL) such as Estelle has been proposed for the development of this
|
||
reference implementation
|
||
|
||
To assist in this work, a Sun model 3/260 computer system has been
|
||
purchased. This computer features a 327 megabyte disk drive, a 1/4 inch
|
||
cartridge tape drive and color monitor.
|
||
|
||
The development and implementation of a conformance test methodology for
|
||
SP4 security devices complement this work. Conformance tests of computer
|
||
products help validate a manufacturer's claim that a product conforms to a
|
||
standard. For users, conformance testing reduces risks and uncertainties
|
||
associated with efforts to link products of different manufacturers. A
|
||
conformance test methodology provides vendors with the incentive needed to
|
||
accelerate the development and marketing of a product.
|
||
|
||
NIST's conformance testing methodology will provide procedures for
|
||
accrediting testing facilities to conduct follow-on work. Documentation will
|
||
be provided that will permit other organizations and laboratories to perform
|
||
SP4 protocol conformance tests in an automated fashion.
|
||
|
||
|
||
|
||
|
||
LIST OF ABBREVIATIONS
|
||
|
||
|
||
|
||
ANSI American National Standards Institute
|
||
CSMA/CD Carrier Sense Multiple Access/Collision Detection
|
||
DES Data Encryption Standard
|
||
DESNC Digital Ethernet Secure Network Controller
|
||
DIGITAL Digital Equipment Corporation
|
||
E-MAIL Electronic Mail
|
||
FIPS Federal Information Processing Standard
|
||
FDL Formal Description Language
|
||
GOSIP Government Open Systems Interconnection Profile
|
||
HUGHES Hughes Aircraft Company
|
||
IEEE Institute of Electrical and Electronics Engineers, Inc.
|
||
ISDN Integrated Services Digital Network
|
||
ISO International Standards Organization
|
||
KMC Key Management Center
|
||
LAN Local Area Network
|
||
NIST National Institute of Standards and Technology
|
||
NCSL National Computer Systems Laboratory
|
||
NSA National Security Agency
|
||
OSI Open Systems Interconnection
|
||
SDNS Secure Data Network System
|
||
SP2 Security Protocol - Layer 2
|
||
SP3 Security Protocol - Layer 3
|
||
SP4 Security Protocol - Layer 4
|
||
SP4-C Security at Layer 4 per Transport Connection
|
||
SP4-E Security at Layer 4 End System to End System
|
||
TP4 Transport Class 4
|
||
|
||
|
||
|
||
|
||
|
||
REFERENCES
|
||
|
||
|
||
SDN.401 SDNS Secure Data Network Systems - Security
|
||
Protocol 4 (SP4); Revision 1.2, 1988-07-12
|
||
|
||
FIPS PUB146 Federal Information Processing Standards
|
||
Publication 146, Government Open Systems
|
||
Interconnection Profile (GOSIP), August 24,
|
||
1988
|
||
|
||
FIPS PUB46-1 Federal Information Processing Standards
|
||
Publication 46-1, Data Encryption Standard,
|
||
Reaffirmed January 22, 1988
|
||
|
||
EK-DESNC-UG-001 DESNC Installation/User's guide - Digital
|
||
Equipment Corp., Maynard, MA.
|
||
|
||
ISO7498 Information Processing Systems - Open Systems
|
||
Interconnection - Security Architecture (Part 2)
|
||
|
||
ISO8073 Information Processing Systems - Open Systems
|
||
Interconnection - Connection Oriented Transport
|
||
Protocol Specification - Addendum 2: Class
|
||
Four Operation Over Connectionless Network
|
||
Service
|
||
|
||
ISO8602 Information Processing System - Open Systems
|
||
Interconnection -Protocol for Providing the
|
||
Connectionless - Mode Transport Service
|
||
|
||
ISO802.3 ANSI/IEEE Standard Draft International
|
||
Standard - Carrier Sense Multiple Access with
|
||
Collision Detection
|
||
|
||
|
||
|
||
|
||
|
||
|
||
|
||
APPENDIX 1 OSI SECURITY LABORATORY MILESTONES
|
||
|
||
|
||
As one of its milestones in support of the SDNS project, the National
|
||
Computer Systems Laboratory (NCSL) of NIST undertook the development
|
||
of an OSI Security Laboratory in FY88. The purpose of the laboratory is to
|
||
permit engineers and computer scientists from NIST and participating vendors
|
||
to:
|
||
|
||
<20> Develop security protocols for computer network security
|
||
<20> Develop a demonstration system showing interoperability of devices
|
||
implementing the Security Protocol at Layer 4 (SP4)
|
||
<20> Develop and conduct conformance tests for SP4
|
||
|
||
Planning for the OSI Security Laboratory was begun in October 1987
|
||
following approval to renovate two adjoining chemical laboratories in the
|
||
Technology Building. Physical and electrical layouts were developed by NIST
|
||
engineers. The plans were approved in November and the extensive work
|
||
required to remodel the area was begun in January 1988. This phase of the
|
||
work was completed in March 1988. Engineers from NIST coordinated these
|
||
activities. The work was accomplished by technicians from the NIST Plant
|
||
Division and included:
|
||
|
||
<20> Removal of all chemical laboratory services including hot/cold water,
|
||
gas burners, and other miscellaneous equipment
|
||
<20> Removal of fume hood and cabinets
|
||
<20> Removal of the partitions separating the two rooms to permit
|
||
conversion to a double module laboratory
|
||
<20> Installation of additional lighting
|
||
<20> Site security provided by installation of cipher lock and heat and
|
||
smoke sensors
|
||
<20> Installation of electrical raceway and receptacles
|
||
<20> HVAC renovation
|
||
<20> Painting of entire laboratory space
|
||
|
||
While renovation work was underway a contract was issued for installation of
|
||
a raised floor system, carpeting, and an entrance ramp. The renovation work
|
||
in the laboratory space, including the raised floor, was completed on April 30,
|
||
1988.
|
||
|
||
A layout for computers and workstations for the laboratory was developed by
|
||
NIST engineers. Meetings were held with representatives of four suppliers
|
||
of computer furniture to discuss requirements and estimated costs.
|
||
|
||
Final installation of the furniture and telecommunications center was
|
||
completed in August 1988. Lines for three phones were also installed that
|
||
same month.
|
||
|
||
Following completion of all renovation work, a Sun model 3/50 workstation
|
||
was installed in the laboratory. Additional computer equipment installed on
|
||
the 802.3 LAN in the OSI Security Laboratory includes:
|
||
|
||
<20> Sun model 3/280 system - to be used for monitoring data packets
|
||
during interoperability tests
|
||
|
||
<20> Sun model 3/260 system - to be used for developing the NIST SP4
|
||
reference implementation
|
||
|
||
<20> Two IBM PC/RT's
|
||
|
||
<20> Digital VAX station and two DESNC encryption boxes
|
||
|
||
<20> Hughes Aircraft Company SP4 implementation using an IBM PC
|
||
|
||
|
||
|
||
APPENDIX 2 OSI SECURITY LAB GUIDELINES
|
||
|
||
|
||
1) All documentation, software, and hardware used in the lab will be
|
||
unclassified.
|
||
|
||
2) All NIST personnel who receive any proprietary products must, before
|
||
their receipt, be informed of the proprietary nature of the product.
|
||
|
||
3) NIST will provide reasonable protection for all proprietary information,
|
||
hardware, software, and documentation including locked storage cabinets and
|
||
a Cipher lock on the door of the lab.
|
||
|
||
4) Hardware loaned to NIST will be afforded reasonable protection against
|
||
theft, damage, and destruction. Maintenance of the equipment will be
|
||
provided by the vendors in accordance with the vendor agreements.
|
||
|
||
5) Equipment provided by the vendors will be used in interoperability
|
||
demonstrations conducted in the Security Lab. Equipment will be
|
||
demonstrated only with permission of the vendor.
|
||
|
||
6) Failures that occur during the interoperability demonstrations will not be
|
||
disclosed to other than the technical representatives of the vendor of the
|
||
device being demonstrated.
|
||
|
||
7) NIST will destroy any proprietary software stored in any CPU or other
|
||
storage medium which cannot be returned to the vendor after completion of
|
||
the demonstrations.
|
||
|
||
|
||
|
||
|
||
APPENDIX 3 NIST SP4 DEMONSTRATION AGREEMENTS
|
||
|