One document matched: draft-irtf-dtnrg-bundle-metadata-conf-00.txt




DTN Research Group                                             P. Lovell
Internet-Draft                                              SPARTA, Inc.
Expires: April 29, 2009                                 October 26, 2008


           DTN Bundle Metadata Confidentiality Specification
                draft-irtf-dtnrg-bundle-metadata-conf-00

Status of this Memo

   By submitting this Internet-Draft, each author represents that any
   applicable patent or other IPR claims of which he or she is aware
   have been or will be disclosed, and any of which he or she becomes
   aware will be disclosed, in accordance with Section 6 of BCP 79.

   Internet-Drafts are working documents of the Internet Engineering
   Task Force (IETF), its areas, and its working groups.  Note that
   other groups may also distribute working documents as Internet-
   Drafts.

   Internet-Drafts are draft documents valid for a maximum of six months
   and may be updated, replaced, or obsoleted by other documents at any
   time.  It is inappropriate to use Internet-Drafts as reference
   material or to cite them other than as "work in progress."

   The list of current Internet-Drafts can be accessed at
   http://www.ietf.org/ietf/1id-abstracts.txt.

   The list of Internet-Draft Shadow Directories can be accessed at
   http://www.ietf.org/shadow.html.

   This Internet-Draft will expire on April 29, 2009.

Copyright Notice

   Copyright (C) The IETF Trust (2008).















Lovell                   Expires April 29, 2009                 [Page 1]

Internet-Draft          Metadata Confidentiality            October 2008


Abstract

   This document describes a confidentiality ciphersuite for metadata in
   Delay-Tolerant Networking (DTN) Bundle Protocol (BP) bundles.


Table of Contents

   1.  Introduction . . . . . . . . . . . . . . . . . . . . . . . . .  3
   2.  Storage Layout . . . . . . . . . . . . . . . . . . . . . . . .  4
   3.  CB-RSA-AES128-MB . . . . . . . . . . . . . . . . . . . . . . .  6
   4.  IANA Considerations  . . . . . . . . . . . . . . . . . . . . .  7
   5.  References . . . . . . . . . . . . . . . . . . . . . . . . . .  8
     5.1.  Normative References . . . . . . . . . . . . . . . . . . .  8
     5.2.  Informative References . . . . . . . . . . . . . . . . . .  8
   Author's Address . . . . . . . . . . . . . . . . . . . . . . . . .  9
   Intellectual Property and Copyright Statements . . . . . . . . . . 10


































Lovell                   Expires April 29, 2009                 [Page 2]

Internet-Draft          Metadata Confidentiality            October 2008


1.  Introduction

   The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
   "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
   document are to be interpreted as described in [1].

   This document defines a ciphersuite to protect metadata portions of a
   bundle.  Bundles and the bundle protocol are described in [2].
   Metadata blocks are described in [3]

   A bundle may contain one or more metadata blocks with information
   useful for routing and other decisions.  In some scenarios it is
   necessary to prevent the metadata from being read in transit or at
   DTN nodes other than those authorized to do so.

   This ciphersuite is not for the direct use of the DTN bundle security
   protocol [4] since the confideniality described there is primarily
   for payload blocksand other security blocks related to the payload.
   Applying payload security to metadata will use the same key as the
   payload and this defeats most of the attractive characteristics we
   want.  We therefore define a confidentiality suite that uses a
   different extension block type.





























Lovell                   Expires April 29, 2009                 [Page 3]

Internet-Draft          Metadata Confidentiality            October 2008


2.  Storage Layout

   All extension blocks use the Canonical Bundle Block Format as defined
   in the Bundle Protocol Specification, and security blocks follow the
   Abstract Security Block layout shown in [4] Section 2.1.  This block
   generally follows the Confidentiality Block description in Section
   2.4 and Confidentiality ciphersuite #3 in Section 4.3, with
   exceptions and adjustments noted here.

   The layout is reproduced here (non-normative) for the convenience of
   readers, please refer to [4] for complete details.


   +----------------+----------------+----------------+----------------+
   | type           |  flags (SDNV)  |  EID ref list(comp)             |
   +----------------+----------------+----------------+----------------+
   | length  (SDNV)                                                    |
   +----------------+----------------+----------------+----------------+
   | ciphersuite                     | correlator  (SDNV) (optional)   |
   +----------------+----------------+----------------+----------------+
   |params len(SDNV)| ciphersuite params data                          |
   +----------------+----------------+----------------+----------------+
   |res-len  (SDNV) | security result data                             |
   +----------------+----------------+----------------+----------------+

   The structure of an abstract security block

                                 Figure 1

   Block type is 0x09. [needs conflict check]

   Ciphersuite flags indicate which fields are present in this block.

   EID references MUST be stored in the EID reference list.

   Security-source MAY be present.  If not present, then the bundle-
   source is the security-source.

   Security-destination SHOULD be present.  If not present, then the
   bundle-destination is the security-destination.  In typical usage,
   the security-destination will be a logical group address of nodes
   which might be expected to use the metadata.  Format of this group
   address is to be determined.

   Ciphersuite parameters and results are described in [4].

   The following items will be present in ciphersuite parameters




Lovell                   Expires April 29, 2009                 [Page 4]

Internet-Draft          Metadata Confidentiality            October 2008


      1: initialization vector (IV)

      7: C block salt

      8: C block ICV

   The following items will be present in ciphersuite results

      3: key information

      13: encapsulated metadata block








































Lovell                   Expires April 29, 2009                 [Page 5]

Internet-Draft          Metadata Confidentiality            October 2008


3.  CB-RSA-AES128-MB

   The CB-RSA-AES128-MB ciphersuite has ciphersuite ID value 0x004.

   This scheme encrypts metadata blocks of block type 0x08.

   The key size for this ciphersuite is 128 bits.

   Encryption is done using the AES algorithm in Galois/Counter Mode
   (GCM) as defined for ciphersuite #3 in [4] .

   The metadata block in the bundle is encrypted in its entirety using
   the key materials described in Section 2.  The resultant ciphertext,
   plus the type and length, is placed into the security-result field of
   the C block.  This C block then replaces the metadata block in the
   bundle.

   The key details are specified as key information (item type 2).  The
   salt and IV items must be present in ciphersuite parameters.

   In normal usage, a node receiving a metadata block in encrypted form
   will decrypt the block and recover the metadata for its own purposes.
   If the block is forwarded then it SHOULD be in the as-received
   encrypted form, unless policy determines otherwise.

   The processing of the block from metadata to encrypted metadata is
   very similar to that performed on Payload Integrity Blocks in the
   standard Bundle Security Prototol, except that this blocks contains
   key information and there is no correlator.






















Lovell                   Expires April 29, 2009                 [Page 6]

Internet-Draft          Metadata Confidentiality            October 2008


4.  IANA Considerations

   None at this time.  If the bundle protocol becomes a standards track
   protocol, then we may want to consider having IANA establish a
   register of block types, and in particular for this specification a
   separate register of block formats.













































Lovell                   Expires April 29, 2009                 [Page 7]

Internet-Draft          Metadata Confidentiality            October 2008


5.  References

5.1.  Normative References

   [1]  Bradner, S. and J. Reynolds, "Key words for use in RFCs to
        Indicate Requirement Levels", RFC 2119, October 1997.

   [2]  Scott, K., "Bundle Protocol Specification",
        draft-irtf-dtnrg-bundle-spec-09.txt , April 2007.

   [3]  Symington, S., "Delay-Tolerant Networking Metadata Extension
        Block", draft-irtf-dtnrg-bundle-metadata-block-00.txt ,
        June 2007.

   [4]  Symington, S., Farrell, S., Weiss, H., and P. Lovell, "Bundle
        Security Protocol Specification",
        draft-irtf-dtnrg-bundle-security-03.txt , March 2007.

5.2.  Informative References

   [5]  Cerf, V., "Delay-Tolerant Network Architecture",
        draft-irtf-dtnrg-arch-07.txt , October 2006,
        <draft-irtf-dtnrg-arch-07.txt>.

   [6]  Farrell, S., Symington, S., and H. Weiss, "Delay-Tolerant
        Network Security Overview",
        draft-irtf-dtnrg-sec-overview-02.txt , October 2006.
























Lovell                   Expires April 29, 2009                 [Page 8]

Internet-Draft          Metadata Confidentiality            October 2008


Author's Address

   Peter Lovell
   SPARTA, Inc.
   7110 Samuel Morse Drive
   Columbia, MD  21046
   US

   Phone: +1-443-430-8052
   Email: peter.lovell@sparta.com









































Lovell                   Expires April 29, 2009                 [Page 9]

Internet-Draft          Metadata Confidentiality            October 2008


Full Copyright Statement

   Copyright (C) The IETF Trust (2008).

   This document is subject to the rights, licenses and restrictions
   contained in BCP 78, and except as set forth therein, the authors
   retain all their rights.

   This document and the information contained herein are provided on an
   "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
   OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY, THE IETF TRUST AND
   THE INTERNET ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS
   OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF
   THE INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
   WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.


Intellectual Property

   The IETF takes no position regarding the validity or scope of any
   Intellectual Property Rights or other rights that might be claimed to
   pertain to the implementation or use of the technology described in
   this document or the extent to which any license under such rights
   might or might not be available; nor does it represent that it has
   made any independent effort to identify any such rights.  Information
   on the procedures with respect to rights in RFC documents can be
   found in BCP 78 and BCP 79.

   Copies of IPR disclosures made to the IETF Secretariat and any
   assurances of licenses to be made available, or the result of an
   attempt made to obtain a general license or permission for the use of
   such proprietary rights by implementers or users of this
   specification can be obtained from the IETF on-line IPR repository at
   http://www.ietf.org/ipr.

   The IETF invites any interested party to bring to its attention any
   copyrights, patents or patent applications, or other proprietary
   rights that may cover technology that may be required to implement
   this standard.  Please address the information to the IETF at
   ietf-ipr@ietf.org.


Acknowledgment

   Funding for the RFC Editor function is provided by the IETF
   Administrative Support Activity (IASA).





Lovell                   Expires April 29, 2009                [Page 10]


PAFTECH AB 2003-20262026-04-24 10:28:41