summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc4650.txt
diff options
context:
space:
mode:
authorThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
committerThomas Voss <mail@thomasvoss.com> 2024-11-27 20:54:24 +0100
commit4bfd864f10b68b71482b35c818559068ef8d5797 (patch)
treee3989f47a7994642eb325063d46e8f08ffa681dc /doc/rfc/rfc4650.txt
parentea76e11061bda059ae9f9ad130a9895cc85607db (diff)
doc: Add RFC documents
Diffstat (limited to 'doc/rfc/rfc4650.txt')
-rw-r--r--doc/rfc/rfc4650.txt1515
1 files changed, 1515 insertions, 0 deletions
diff --git a/doc/rfc/rfc4650.txt b/doc/rfc/rfc4650.txt
new file mode 100644
index 0000000..d03147d
--- /dev/null
+++ b/doc/rfc/rfc4650.txt
@@ -0,0 +1,1515 @@
+
+
+
+
+
+
+Network Working Group M. Euchner
+Request for Comments: 4650 September 2006
+Category: Standards Track
+
+
+ HMAC-Authenticated Diffie-Hellman
+ for Multimedia Internet KEYing (MIKEY)
+
+Status of This Memo
+
+ This document specifies an Internet standards track protocol for the
+ Internet community, and requests discussion and suggestions for
+ improvements. Please refer to the current edition of the "Internet
+ Official Protocol Standards" (STD 1) for the standardization state
+ and status of this protocol. Distribution of this memo is unlimited.
+
+Copyright Notice
+
+ Copyright (C) The Internet Society (2006).
+
+Abstract
+
+ This document describes a lightweight point-to-point key management
+ protocol variant for the multimedia Internet keying (MIKEY) protocol
+ MIKEY, as defined in RFC 3830. In particular, this variant deploys
+ the classic Diffie-Hellman key agreement protocol for key
+ establishment featuring perfect forward secrecy in conjunction with a
+ keyed hash message authentication code for achieving mutual
+ authentication and message integrity of the key management messages
+ exchanged. This protocol addresses the security and performance
+ constraints of multimedia key management in MIKEY.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Euchner Standards Track [Page 1]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+Table of Contents
+
+ 1. Introduction ....................................................2
+ 1.1. Definitions ................................................5
+ 1.2. Abbreviations ..............................................6
+ 1.3. Conventions Used in This Document ..........................7
+ 2. Scenario ........................................................7
+ 2.1. Applicability ..............................................7
+ 2.2. Relation to GKMARCH ........................................8
+ 3. DHHMAC Security Protocol ........................................8
+ 3.1. TGK Re-keying .............................................10
+ 4. DHHMAC Payload Formats .........................................10
+ 4.1. Common Header Payload (HDR) ..............................11
+ 4.2. Key Data Transport Payload (KEMAC) ........................12
+ 4.3. ID Payload (ID) ...........................................12
+ 4.4. General Extension Payload .................................12
+ 5. Security Considerations ........................................13
+ 5.1. Security Environment ......................................13
+ 5.2. Threat Model ..............................................13
+ 5.3. Security Features and Properties ..........................15
+ 5.4. Assumptions ...............................................19
+ 5.5. Residual Risk .............................................20
+ 5.6. Authorization and Trust Model .............................21
+ 6. Acknowledgments ................................................21
+ 7. IANA Considerations ............................................22
+ 8. References .....................................................22
+ 8.1. Normative References ......................................22
+ 8.2. Informative References ....................................22
+ Appendix A. Usage of MIKEY-DHHMAC in H.235 ........................25
+
+1. Introduction
+
+ There is work done in IETF to develop key management schemes. For
+ example, IKE [12] is a widely accepted unicast scheme for IPsec, and
+ the MSEC WG is developing other schemes, addressed to group
+ communication [17], [18]. For reasons discussed below, there is,
+ however, a need for a scheme with low latency, suitable for demanding
+ cases such as real-time data over heterogeneous networks and small
+ interactive groups.
+
+ As pointed out in MIKEY (see [2]), secure real-time multimedia
+ applications demand a particular adequate lightweight key management
+ scheme that takes care to establish dynamic session keys securely and
+ efficiently in a conversational multimedia scenario.
+
+ In general, MIKEY scenarios cover peer-to-peer, simple one-to-many,
+ and small-sized groups. MIKEY in particular describes three key
+
+
+
+
+Euchner Standards Track [Page 2]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ management schemes for the peer-to-peer case that all finish their
+ task within one roundtrip:
+
+ - a symmetric key distribution protocol (MIKEY-PS) based on pre-
+ shared master keys
+
+ - a public-key encryption-based key distribution protocol (MIKEY-PK
+ and reverse-mode MIKEY-RSA-R [33]) assuming a public-key
+ infrastructure with RSA-based (Rivest, Shamir and Adleman)
+ private/public keys and digital certificates
+
+ - a Diffie-Hellman key agreement protocol (MIKEY-DHSIGN) deploying
+ digital signatures and certificates.
+
+ All of these three key management protocols are designed so that they
+ complete their work within just one roundtrip. This requires
+ depending on loosely synchronized clocks and deploying timestamps
+ within the key management protocols.
+
+ However, it is known [6] that each of the three key management
+ schemes has its subtle constraints and limitations:
+
+ - The symmetric key distribution protocol (MIKEY-PS) is simple to
+ implement; however, it was not intended to scale to support any
+ configurations beyond peer-to-peer, simple one-to-many, and
+ small-size (interactive) groups, due to the need for mutually
+ pre-assigned shared master secrets.
+
+ Moreover, the security provided does not achieve the property of
+ perfect forward secrecy; i.e., compromise of the shared master
+ secret would render past and even future session keys susceptible
+ to compromise.
+
+ Further, the generation of the session key happens just at the
+ initiator. Thus, the responder has to fully trust the initiator
+ to choose a good and secure session secret; the responder is able
+ neither to participate in the key generation nor to influence that
+ process. This is considered a specific limitation in less trusted
+ environments.
+
+ - The public-key encryption scheme (MIKEY-PK and MIKEY-RSA-R [33])
+ depends upon a public-key infrastructure that certifies the
+ private-public keys by issuing and maintaining digital
+ certificates. While such key management schemes provide full
+ scalability in large networked configurations, public-key
+ infrastructures are still not widely available, and, in general,
+ implementations are significantly more complex.
+
+
+
+
+Euchner Standards Track [Page 3]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ Further, additional roundtrips and computational processing might
+ be necessary for each end system in order to ascertain
+ verification of the digital certificates. For example, typical
+ operations in the context of a public-key infrastructure may
+ involve extra network communication handshakes with the public-key
+ infrastructure and with certification authorities and may
+ typically involve additional processing steps in the end systems.
+ These operations would include validating digital certificates
+ (RFC 3029, [24]), ascertaining the revocation status of digital
+ certificates (RFC 2560, [23]), asserting certificate policies,
+ construction of certification path(s) ([26]), requesting and
+ obtaining necessary certificates (RFC 2511, [25]), and management
+ of certificates for such purposes ([22]). Such steps and tasks
+ all result in further delay of the key agreement or key
+ establishment phase among the end systems, which negatively
+ affects setup time. Any extra PKI handshakes and processing are
+ not in the scope of MIKEY, and since this document only deploys
+ symmetric security mechanisms, aspects of PKI, digital
+ certificates, and related processing are not further covered in
+ this document.
+
+ Finally, as in the symmetric case, the responder depends
+ completely upon the initiator's choosing good and secure session
+ keys.
+
+ - The third MIKEY-DHSIGN key management protocol deploys the
+ Diffie-Hellman key agreement scheme and authenticates the exchange
+ of the Diffie-Hellman half-keys in each direction by using a
+ digital signature. This approach has the same advantages and
+ deficiencies as described in the previous section in terms of a
+ public-key infrastructure.
+
+ However, the Diffie-Hellman key agreement protocol is known for
+ its subtle security strengths in that it is able to provide full
+ perfect forward secrecy (PFS) and further have to both parties
+ actively involved in session key generation. This special
+ security property (despite the somewhat higher computational
+ costs) makes Diffie-Hellman techniques attractive in practice.
+
+ In order to overcome some of the limitations as outlined above, a
+ special need has been recognized for another efficient key agreement
+ protocol variant in MIKEY. This protocol variant aims to provide the
+ capability of perfect forward secrecy as part of a key agreement with
+ low latency without dependency on a public-key infrastructure.
+
+
+
+
+
+
+
+Euchner Standards Track [Page 4]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ This document describes a fourth lightweight key management scheme
+ for MIKEY that could somehow be seen as a synergetic optimization
+ between the pre-shared key distribution scheme and the Diffie-Hellman
+ key agreement.
+
+ The idea of the protocol in this document is to apply the Diffie-
+ Hellman key agreement, but rather than deploy a digital signature for
+ authenticity of the exchanged keying material, it instead uses a
+ keyed-hash for symmetrically pre-assigned shared secrets. This
+ combination of security mechanisms is called the HMAC-authenticated
+ Diffie-Hellman (DH) key agreement for MIKEY (DHHMAC).
+
+ The DHHMAC variant closely follows the design and philosophy of MIKEY
+ and reuses MIKEY protocol payload components and MIKEY mechanisms to
+ its maximum benefit and for best compatibility.
+
+ Like the MIKEY Diffie-Hellman protocol, DHHMAC does not scale beyond
+ a point-to-point constellation; thus, both MIKEY Diffie-Hellman
+ protocols do not support group-based keying for any group size larger
+ than two entities.
+
+1.1. Definitions
+
+ The definitions and notations in this document are aligned with
+ MIKEY; see [2] sections 1.3 - 1.4.
+
+ All large integer computations in this document should be understood
+ as being mod p within some fixed group G for some large prime p; see
+ [2] section 3.3. However, the DHHMAC protocol is also applicable
+ generally to other appropriate finite, cyclical groups as well.
+
+ It is assumed that a pre-shared key s is known by both entities
+ (initiator and responder). The authentication key auth_key is
+ derived from the pre-shared secret s using the pseudo-random function
+ PRF; see [2] sections 4.1.3 and 4.1.5.
+
+ In this text, [X] represents an optional piece of information.
+ Generally throughout the text, X SHOULD be present unless certain
+ circumstances MAY allow X to be optional and not to be present,
+ thereby potentially resulting in weaker security. Likewise, [X, Y]
+ represents an optional compound piece of information where the pieces
+ X and Y either SHOULD both be present or MAY optionally both be
+ absent. {X} denotes zero or more occurrences of X.
+
+
+
+
+
+
+
+
+Euchner Standards Track [Page 5]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+1.2. Abbreviations
+
+ auth_key Pre-shared authentication key, PRF-derived from
+ pre-shared key s.
+ DH Diffie-Hellman
+ DHi Public Diffie-Hellman half key g^(xi) of the
+ Initiator
+ DHr Public Diffie-Hellman half key g^(xr) of the
+ Responder
+ DHHMAC HMAC-authenticated Diffie-Hellman
+ DoS Denial-of-service
+ G Diffie-Hellman group
+ HDR MIKEY common header payload
+ HMAC Keyed Hash Message Authentication Code
+ HMAC-SHA1 HMAC using SHA1 as hash function (160-bit result)
+ IDi Identity of initiator
+ IDr Identity of receiver
+ IKE Internet Key Exchange
+ IPsec Internet Protocol Security
+ MIKEY Multimedia Internet KEYing
+ MIKEY-DHHMAC MIKEY Diffie-Hellman key management protocol using
+ HMAC
+ MIKEY-DHSIGN MIKEY Diffie-Hellman key agreement protocol
+ MIKEY-PK MIKEY public-key encryption-based key distribution
+ protocol
+ MIKEY-PS MIKEY pre-shared key distribution protocol
+ p Diffie-Hellman prime modulus
+ PKI Public-key Infrastructure
+ PRF MIKEY pseudo-random function (see [2] section
+ 4.1.3)
+ RSA Rivest, Shamir, and Adleman
+ s Pre-shared key
+ SDP Session Description Protocol
+ SOI Son-of-IKE, IKEv2
+ SP MIKEY Security Policy (Parameter) Payload
+ T Timestamp
+ TEK Traffic Encryption Key
+ TGK MIKEY TEK Generation Key, as the common Diffie-
+ Hellman shared secret
+ TLS Transport Layer Security
+ xi Secret, (pseudo) random Diffie-Hellman key of the
+ Initiator
+ xr Secret, (pseudo) random Diffie-Hellman key of the
+ Responder
+
+
+
+
+
+
+
+Euchner Standards Track [Page 6]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+1.3. Conventions Used in This Document
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [1].
+
+2. Scenario
+
+ The HMAC-authenticated Diffie-Hellman key agreement protocol (DHHMAC)
+ for MIKEY addresses the same scenarios and scope as the other three
+ key management schemes in MIKEY address.
+
+ DHHMAC is applicable in a peer-to-peer group where no access to a
+ public-key infrastructure can be assumed to be available. Rather,
+ pre- shared master secrets are assumed to be available among the
+ entities in such an environment.
+
+ In a pair-wise group, it is assumed that each client will be setting
+ up a session key for its outgoing links with its peer using the DH-
+ MAC key agreement protocol.
+
+ As is the case for the other three MIKEY key management protocols,
+ DHHMAC assumes, at least, loosely synchronized clocks among the
+ entities in the small group.
+
+ To synchronize the clocks in a secure manner, some operational or
+ procedural means are recommended. MIKEY-DHHMAC does not define any
+ secure time synchronization measures; however, sections 5.4 and 9.3
+ of [2] provide implementation guidance on clock synchronization and
+ timestamps.
+
+2.1. Applicability
+
+ MIKEY-DHHMAC and the other MIKEY key management protocols are
+ intended for application-level key management and are optimized for
+ multimedia applications with real-time session setup and session
+ management constraints.
+
+ As the MIKEY-DHHMAC key management protocol terminates in one
+ roundtrip, DHHMAC is applicable for integration into two-way
+ handshake session or call signaling protocols such as
+
+ a) SIP [13] and SDP, where the encoded MIKEY messages are
+ encapsulated and transported in SDP containers of the SDP
+ offer/answer see RFC 3264 [27]) handshake, as described in [4];
+ and
+
+
+
+
+
+Euchner Standards Track [Page 7]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ b) H.323 (see [15]), where the encoded MIKEY messages are transported
+ in the H.225.0 fast start call signaling handshake. Appendix A
+ outlines the usage of MIKEY-DHHMAC within H.235.
+
+ MIKEY-DHHMAC is offered as an option to the other MIKEY key
+ management variants (MIKEY-pre-shared, MIKEY-public-key and MIKEY-
+ DH-SIGN) for all those cases where DHHMAC has its particular
+ strengths (see section 5).
+
+2.2. Relation to GKMARCH
+
+ The Group key management architecture (GKMARCH) [19] describes a
+ generic architecture for multicast security group key management
+ protocols. In the context of this architecture, MIKEY-DHHMAC may
+ operate as a registration protocol; see also [2] section 2.4. The
+ main entities involved in the architecture are a group controller/key
+ server (GCKS), the receiver(s), and the sender(s). Due to the pair-
+ wise nature of the Diffie-Hellman operation and the 1-roundtrip
+ constraint, usage of MIKEY-DHHMAC rules out any deployment as a group
+ key management protocol with more than two group entities. Only the
+ degenerate case with two peers is possible where, for example, the
+ responder acts as the group controller.
+
+ Note that MIKEY does not provide re-keying in the GKMARCH sense, only
+ updating of the keys by normal unicast messages.
+
+3. DHHMAC Security Protocol
+
+ The following figure defines the security protocol for DHHMAC:
+
+ Initiator Responder
+
+ I_message = HDR, T, RAND, [IDi], IDr,
+ {SP}, DHi, KEMAC
+ -----------------------> R_message = HDR, T,
+ [IDr], IDi, DHr,
+ DHi, KEMAC
+ <----------------------
+
+
+ Figure 1: HMAC-authenticated Diffie-Hellman key-based exchange,
+ where xi and xr are (pseudo) randomly chosen, respectively,
+ by the initiator and the responder.
+
+ The DHHMAC key exchange SHALL be done according to Figure 1. The
+ initiator chooses a (pseudo) random value, xi, and sends an HMACed
+ message including g^(xi) and a timestamp to the responder. It is
+ recommended that the initiator SHOULD always include the identity
+
+
+
+Euchner Standards Track [Page 8]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ payloads IDi and IDr within the I_message; unless the receiver can
+ defer the initiator's identity by some other means, IDi MAY
+ optionally be omitted. The initiator SHALL always include the
+ recipient's identity.
+
+ The group parameters (e.g., the group G) are a set of parameters
+ chosen by the initiator. Note that like in the MIKEY protocol, both
+ sender and receiver explicitly transmit the Diffie-Hellman group G
+ within the Diffie-Hellman payload DHi or DHr through an encoding
+ (e.g., OAKLEY group numbering; see [2] section 6.4). The actual
+ group parameters g and p, however, are not explicitly transmitted but
+ can be deduced from the Diffie-Hellman group G. The responder
+ chooses a (pseudo) random positive integer, xr, and sends an HMACed
+ message including g^(xr) and the timestamp to the initiator. The
+ responder SHALL always include the initiator's identity IDi
+ regardless of whether the I_message conveyed any IDi. It is
+ RECOMMENDED that the responder SHOULD always include the identity
+ payload IDr within the R_message; unless the initiator can defer the
+ responder's identity by some other means, IDr MAY optionally be left
+ out.
+
+ Both parties then calculate the TGK as g^(xi * xr).
+
+ The HMAC authentication provides authentication of the DH half-keys
+ and is necessary to avoid man-in-the-middle attacks.
+
+ This approach is less expensive than digitally signed Diffie-Hellman
+ in that both sides compute one exponentiation and one HMAC first,
+ then one HMAC verification, and finally another Diffie-Hellman
+ exponentiation.
+
+ With off-line pre-computation, the initial Diffie-Hellman half-key
+ MAY be computed before the key management transaction and thereby MAY
+ further reduce the overall roundtrip delay, as well as the risk of
+ denial-of-service attacks.
+
+ Processing of the TGK SHALL be accomplished as described in MIKEY [2]
+ section 4.
+
+ The computed HMAC result SHALL be conveyed in the KEMAC payload field
+ where the MAC fields holds the HMAC result. The HMAC SHALL be
+ computed over the entire message, excluding the MAC field using
+ auth_key; see also section 4.2.
+
+
+
+
+
+
+
+
+Euchner Standards Track [Page 9]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+3.1. TGK Re-keying
+
+ TGK re-keying for DHHMAC generally proceeds as described in [2]
+ section 4.5. Specifically, Figure 2 provides the message exchange
+ for the DHHMAC update message.
+
+ Initiator Responder
+
+ I_message = HDR, T, [IDi], IDr,
+ {SP}, [DHi], KEMAC
+ -----------------------> R_message = HDR, T,
+ [IDr], IDi,
+ [DHr, DHi], KEMAC
+ <----------------------
+
+ Figure 2: DHHMAC update message
+
+ TGK re-keying supports two procedures:
+
+ a) True re-keying by exchanging new and fresh Diffie-Hellman half-
+ keys. For this, the initiator SHALL provide a new, fresh DHi, and
+ the responder SHALL respond with a new, fresh DHr and the received
+ DHi.
+
+ b) Non-key related information update without including any Diffie-
+ Hellman half-keys in the exchange. Such a transaction does not
+ change the actual TGK but updates other information such as
+ security policy parameters. To update the non-key related
+ information only, [DHi] and [DHr, DHi] SHALL be left out.
+
+4. DHHMAC Payload Formats
+
+ This section specifies the payload formats and data type values for
+ DHHMAC; see also [2] section 6, for a definition of the MIKEY
+ payloads.
+
+
+ This document does not define new payload formats but re-uses MIKEY
+ payloads for DHHMAC as referenced:
+
+ * Common header payload (HDR); see section 4.1 and [2] section 6.1.
+
+ * SRTP ID sub-payload; see [2] section 6.1.1.
+
+ * Key data transport payload (KEMAC); see section 4.2 and [2] section
+ 6.2.
+
+ * DH data payload; see [2] section 6.4.
+
+
+
+Euchner Standards Track [Page 10]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ * Timestamp payload; see [2] section 6.6.
+
+ * ID payload; [2] section 6.7.
+
+ * Security Policy payload (SP); see [2] section 6.10.
+
+ * RAND payload (RAND); see [2] section 6.11.
+
+ * Error payload (ERR); see [2] section 6.12.
+
+ * General Extension Payload; see [2] section 6.15.
+
+4.1. Common Header Payload (HDR)
+
+ Referring to [2] section 6.1, the following data types SHALL be used
+ for DHHMAC:
+
+ Data type | Value | Comment
+ -------------------------------------------------------------
+ DHHMAC init | 7 | Initiator's DHHMAC exchange message
+ DHHMAC resp | 8 | Responder's DHHMAC exchange message
+ Error | 6 | Error message; see [2] section 6.12
+
+ Table 4.1.a
+
+ Note: A responder is able to recognize the MIKEY DHHMAC protocol by
+ evaluating the data type field as 7 or 8. This is how the responder
+ can differentiate between MIKEY and MIKEY DHHMAC.
+
+ The next payload field SHALL be one of the following values:
+
+ Next payload| Value | Section
+ ----------------------------------------------------------------
+ Last payload| 0 | -
+ KEMAC | 1 | section 4.2 and [2] section 6.2
+ DH | 3 | [2] section 6.4
+ T | 5 | [2] section 6.6
+ ID | 6 | [2] section 6.7
+ SP | 10 | [2] section 6.10
+ RAND | 11 | [2] section 6.11
+ ERR | 12 | [2] section 6.12
+ General Ext.| 21 | [2] section 6.15
+
+ Table 4.1.b
+
+ Other defined next payload values defined in [2] SHALL not be applied
+ to DHHMAC.
+
+
+
+
+Euchner Standards Track [Page 11]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ In case of a decoding error or of a failed HMAC authentication
+ verification, the responder SHALL apply the Error payload data type.
+
+4.2. Key Data Transport Payload (KEMAC)
+
+ DHHMAC SHALL apply this payload for conveying the HMAC result along
+ with the indicated authentication algorithm. When used in
+ conjunction with DHHMAC, KEMAC SHALL not convey any encrypted data;
+ thus, Encr alg SHALL be set to 2 (NULL), Encr data len SHALL be set
+ to 0, and Encr data SHALL be left empty. The AES key wrap method
+ (see [16]) SHALL not be applied for DHHMAC.
+
+ For DHHMAC, this key data transport payload SHALL be the last payload
+ in the message. Note that the Next payload field SHALL be set to
+ Last payload. The HMAC is then calculated over the entire MIKEY
+ message, excluding the MAC field using auth_key as described in [2]
+ section 5.2, and then stored within the MAC field.
+
+ MAC alg | Value | Comments
+ ------------------------------------------------------------------
+ HMAC-SHA-1 | 0 | Mandatory, Default (see [3])
+ NULL | 1 | Very restricted use; see
+ | [2] section 4.2.4
+
+ Table 4.2.a
+
+ HMAC-SHA-1 is the default hash function that MUST be implemented as
+ part of the DHHMAC. The length of the HMAC-SHA-1 result is 160 bits.
+
+4.3. ID Payload (ID)
+
+ For DHHMAC, this payload SHALL only hold a non-certificate-based
+ identity.
+
+4.4. General Extension Payload
+
+ For DHHMAC, to avoid bidding-down attacks, this payload SHALL list
+ all key management protocol identifiers of a surrounding
+ encapsulation protocol, such as SDP [4]. The General Extension
+ Payload SHALL be integrity protected with the HMAC using the shared
+ secret.
+
+ Type | Value | Comments
+ SDP IDs | 1 | List of SDP key management IDs (allocated for
+ use in [4]); see also [2] section 6.15.
+
+ Table 4.4.a
+
+
+
+
+Euchner Standards Track [Page 12]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+5. Security Considerations
+
+ This document addresses key management security issues throughout.
+ For a comprehensive explanation of MIKEY security considerations,
+ please refer to MIKEY [2] section 9.
+
+ In addition, this document addresses security issues according to
+ [7], where the following security considerations apply in particular
+ to this document:
+
+5.1. Security Environment
+
+ The DHHMAC security protocol described in this document focuses
+ primarily on communication security; i.e., the security issues
+ concerned with the MIKEY DHHMAC protocol. Nevertheless, some system
+ security issues are also of interest that are not explicitly defined
+ by the DHHMAC protocol, but that should be provided locally in
+ practice.
+
+ The system that runs the DHHMAC protocol entity SHALL provide the
+ capability to generate (pseudo) random numbers as input to the
+ Diffie-Hellman operation (see [8]). Furthermore, the system SHALL be
+ capable of storing the generated (pseudo) random data, secret data,
+ keys, and other secret security parameters securely (i.e.,
+ confidential and safe from unauthorized tampering).
+
+5.2. Threat Model
+
+ The threat model, to which this document adheres, covers the issues
+ of end-to-end security in the Internet generally, without ruling out
+ the possibility that MIKEY DHHMAC can be deployed in a corporate,
+ closed IP environment. This also includes the possibility that MIKEY
+ DHHMAC can be deployed on a hop-by-hop basis with some intermediate
+ trusted "MIKEY DHHMAC proxies" involved.
+
+ Since DHHMAC is a key management protocol, the following security
+ threats are of concern:
+
+ * Unauthorized interception of plain TGKs: For DHHMAC, this threat
+ does not occur since the TGK is not actually transmitted on the
+ wire (not even in encrypted fashion).
+
+ * Eavesdropping of other, transmitted keying information: DHHMAC
+ protocol does not explicitly transmit the TGK at all. Instead, by
+ using the Diffie-Hellman "encryption" operation, which conceals the
+ secret (pseudo) random values, only partial information (i.e., the
+ DH half-key) for construction of the TGK is transmitted. It is
+ fundamentally assumed that availability of such Diffie-Hellman
+
+
+
+Euchner Standards Track [Page 13]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ half-keys to an eavesdropper does not result in any substantial
+ security risk; see 5.4. Furthermore, the DHHMAC carries other data
+ such as timestamps, (pseudo) random values, identification
+ information or security policy parameters; eavesdropping of any
+ such data is not considered to yield any significant security risk.
+
+ * Masquerade of either entity: This security threat must be avoided,
+ and if a masquerade attack would be attempted, appropriate
+ detection means must be in place. DHHMAC addresses this threat by
+ providing mutual peer entity authentication.
+
+ * Man-in-the-middle attacks: Such attacks threaten the security of
+ exchanged, non-authenticated messages. Man-in-the-middle attacks
+ usually come with masquerade and or loss of message integrity (see
+ below). Man-in-the-middle attacks must be avoided and, if present
+ or attempted, must be detected appropriately. DHHMAC addresses
+ this threat by providing mutual peer entity authentication and
+ message integrity.
+
+ * Loss of integrity: This security threat relates to unauthorized
+ replay, deletion, insertion, and manipulation of messages.
+ Although any such attacks cannot be avoided, they must at least be
+ detected. DHHMAC addresses this threat by providing message
+ integrity.
+
+ * Bidding-down attacks: When multiple key management protocols, each
+ of a distinct security level, are offered (such as those made
+ possible by SDP [4]), avoiding bidding-down attacks is of concern.
+ DHHMAC addresses this threat by reusing the MIKEY General Extension
+ Payload mechanism, where all key management protocol identifiers
+ are to be listed within the MIKEY General Extension Payload.
+
+ Some potential threats are not within the scope of this threat model:
+
+ * Passive and off-line cryptanalysis of the Diffie-Hellman algorithm:
+ Under certain reasonable assumptions (see 5.4, below), it is widely
+ believed that DHHMAC is sufficiently secure and that such attacks
+ are infeasible, although the possibility of a successful attack
+ cannot be ruled out.
+
+ * Non-repudiation of the receipt or of the origin of the message:
+ These are not requirements within the context of DHHMAC in this
+ environment, and thus related countermeasures are not provided at
+ all.
+
+
+
+
+
+
+
+Euchner Standards Track [Page 14]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ * Denial-of-service or distributed denial-of-service attacks: Some
+ considerations are given on some of those attacks, but DHHMAC does
+ not claim to provide full countermeasure against any of those
+ attacks. For example, stressing the availability of the entities
+ is not thwarted by means of the key management protocol; some other
+ local countermeasures should be applied. Further, some DoS attacks
+ are not countered, such as interception of a valid DH- request and
+ its massive instant duplication. Such attacks might at least be
+ countered partially by some local means that are outside the scope
+ of this document.
+
+ * Identity protection: Like MIKEY, identity protection is not a major
+ design requirement for MIKEY-DHHMAC, either; see [2]. No security
+ protocol is known so far that is able to provide the objectives of
+ DHHMAC as stated in section 5.3, including identity protection
+ within just a single roundtrip. MIKEY-DHHMAC trades identity
+ protection for better security for the keying material and shorter
+ roundtrip time. Thus, MIKEY-DHHMAC does not provide identity
+ protection on its own but may inherit such property from a security
+ protocol underneath that actually features identity protection.
+
+ The DHHMAC security protocol (see section 3) and the TGK re-keying
+ security protocol (see section 3.1) provide the option not to
+ supply identity information. This option is only applicable if
+ some other means are available to supply trustworthy identity
+ information; e.g., by relying on secured links underneath MIKEY
+ that supply trustworthy identity information some other way.
+ However, it is understood that without identity information, the
+ MIKEY key management security protocols might be subject to
+ security weaknesses such as masquerade, impersonation, and
+ reflection attacks, particularly in end-to-end scenarios where no
+ other secure means of assured identity information are provided.
+
+ Leaving identity fields optional (if doing so is possible) thus
+ should not be seen as a privacy method, either, but rather as a
+ protocol optimization feature.
+
+5.3. Security Features and Properties
+
+ With the security threats in mind, this document provides the
+ following security features and yields the following properties:
+
+ * Secure key agreement with the establishment of a TGK at both peers:
+ This is achieved using an authenticated Diffie-Hellman key
+ management protocol.
+
+
+
+
+
+
+Euchner Standards Track [Page 15]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ * Peer-entity authentication (mutual): This authentication
+ corroborates that the host/user is authentic in that possession of
+ a pre-assigned secret key is proven using keyed HMAC.
+ Authentication occurs on the request and on the response message;
+ thus authentication is mutual.
+
+ The HMAC computation corroborates for authentication and message
+ integrity of the exchanged Diffie-Hellman half-keys and associated
+ messages. The authentication is absolutely necessary in order to
+ avoid man-in-the-middle attacks on the exchanged messages in
+ transit and, in particular, on the otherwise non-authenticated
+ exchanged Diffie-Hellman half-keys.
+
+ Note: This document does not address issues regarding
+ authorization; this feature is not provided explicitly. However,
+ DHHMAC authentication means support and facilitate realization of
+ authorization means (local issue).
+
+ * Cryptographic integrity check: The cryptographic integrity check is
+ achieved using a message digest (keyed HMAC). It includes the
+ exchanged Diffie-Hellman half-keys but covers the other parts of
+ the exchanged message as well. Both mutual peer entity
+ authentication and message integrity provide effective
+ countermeasures against man-in-the-middle attacks.
+
+ The initiator may deploy a local timer that fires when the awaited
+ response message did not arrive in a timely manner. This is
+ intended to detect deletion of entire messages.
+
+ * Replay protection of the messages is achieved using embedded
+ timestamps: In order to detect replayed messages, it is essential
+ that the clocks among initiator and sender be roughly synchronized.
+ The reader is referred to [2] section 5.4, and [2] section 9.3,
+ which provide further considerations and give guidance on clock
+ synchronization and timestamp usage. Should the clock
+ synchronization be lost, end systems cannot detect replayed
+ messages anymore, and the end systems cannot securely establish
+ keying material. This may result in a denial-of-service; see [2]
+ section 9.5.
+
+ * Limited DoS protection: Rapid checking of the message digest allows
+ verifying the authenticity and integrity of a message before
+ launching CPU intensive Diffie-Hellman operations or starting other
+ resource consuming tasks. This protects against some denial-of-
+ service attacks: malicious modification of messages and spam
+ attacks with (replayed or masqueraded) messages. DHHMAC probably
+ does not explicitly counter sophisticated distributed, large-scale
+ denial-of-service attacks that compromise system availability, for
+
+
+
+Euchner Standards Track [Page 16]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ example. Some DoS protection is provided by inclusion of the
+ initiator's identity payload in the I_message. This allows the
+ recipient to filter out those (replayed) I_messages that are not
+ targeted for him and to avoid creating unnecessary MIKEY sessions.
+
+ * Perfect-forward secrecy (PFS): Other than the MIKEY pre-shared and
+ public-key-based key distribution protocols, the Diffie-Hellman key
+ agreement protocol features a security property called perfect
+ forward secrecy. That is, even if the long-term pre-shared key is
+ compromised at some point in time, this does not compromise past or
+ future session keys.
+
+ Neither the MIKEY pre-shared nor the MIKEY public-key protocol
+ variants are able to provide the security property of perfect-
+ forward secrecy. Thus, none of the other MIKEY protocols is able
+ to substitute the Diffie-Hellman PFS property.
+
+ As such, DHHMAC and digitally signed DH provide a far superior
+ security level to that of the pre-shared or public-key-based key
+ distribution protocol in that respect.
+
+ * Fair, mutual key contribution: The Diffie-Hellman key management
+ protocol is not a strict key distribution protocol per se, in which
+ the initiator distributes a key to its peers. Actually, both
+ parties involved in the protocol exchange are able to contribute to
+ the common Diffie-Hellman TEK traffic generating key equally. This
+ reduces the risk of either party cheating or unintentionally
+ generating a weak session key. This makes the DHHMAC a fair key
+ agreement protocol. One may view this property as an additional
+ distributed security measure that increases security robustness
+ over that of the case where all the security depends just on the
+ proper implementation of a single entity.
+
+ For Diffie-Hellman key agreement to be secure, each party SHALL
+ generate its xi or xr values using a strong, unpredictable pseudo-
+ random generator if a source of true randomness is not available.
+ Further, these values xi or xr SHALL be kept private. It is
+ RECOMMENDED that these secret values be destroyed once the common
+ Diffie-Hellman shared secret key has been established.
+
+ * Efficiency and performance: Like the MIKEY-public key protocol, the
+ MIKEY DHHMAC key agreement protocol securely establishes a TGK
+ within just one roundtrip. Other existing key management
+ techniques, such as IPsec-IKE [12], IPsec-IKEv2 [14], TLS [11], and
+ other schemes, are not deemed adequate in addressing those real-
+ time and security requirements sufficiently; they all use more than
+ a single roundtrip. All the MIKEY key management protocols are
+ able to complete their task of security policy parameter
+
+
+
+Euchner Standards Track [Page 17]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ negotiation, including key-agreement or key distribution, in one
+ roundtrip. However, the MIKEY pre-shared and MIKEY public-key
+ protocol are both able to complete their task even in a half-
+ roundtrip when the confirmation messages are omitted.
+
+ Using HMAC in conjunction with a strong one-way hash function (such
+ as SHA1) may be achieved more efficiently in software than
+ expensive public-key operations. This yields a particular
+ performance benefit of DHHMAC over signed DH or the public-key
+ encryption protocol.
+
+ If a very high security level is desired for long-term secrecy of
+ the negotiated Diffie-Hellman shared secret, longer hash values may
+ be deployed, such as SHA256, SHA384, or SHA512 provide, possibly in
+ conjunction with stronger Diffie-Hellman groups. This is left as
+ for further study.
+
+ For the sake of improved performance and reduced roundtrip delay,
+ either party may pre-compute its public Diffie-Hellman half-key
+ off-line.
+
+ On the other side and under reasonable conditions, DHHMAC consumes
+ more CPU cycles than the MIKEY pre-shared key distribution
+ protocol. The same might hold true quite likely for the MIKEY
+ public-key distribution protocol (depending on choice of the
+ private and public key lengths). As such, it can be said that
+ DHHMAC provides sound performance when compared with the other
+ MIKEY protocol variants.
+
+ The use of optional identity information (with the constraints
+ stated in section 5.2) and optional Diffie-Hellman half-key fields
+ provides a means to increase performance and shorten the consumed
+ network bandwidth.
+
+ * Security infrastructure: This document describes the HMAC-
+ authenticated Diffie-Hellman key agreement protocol, which
+ completely avoids digital signatures and the associated public-key
+ infrastructure, as would be necessary for the X.509 RSA public-
+ key-based key distribution protocol or the digitally signed
+ Diffie-Hellman key agreement protocol as described in MIKEY.
+ Public-key infrastructures may not always be available in certain
+ environments, nor may they be deemed adequate for real-time
+ multimedia applications when additional steps are taken for
+ certificate validation and certificate revocation methods with
+ additional roundtrips into account.
+
+
+
+
+
+
+Euchner Standards Track [Page 18]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ DHHMAC does not depend on PKI, nor do implementations require PKI
+ standards. Thus, it is believed to be much simpler than the more
+ complex PKI facilities.
+
+ DHHMAC is particularly attractive in those environments where
+ provisioning of a pre-shared key has already been accomplished.
+
+ * NAT-friendliness: DHHMAC is able to operate smoothly through
+ firewall/NAT devices as long as the protected identity information
+ of the end entity is not an IP/transport address.
+
+ * Scalability: Like the MIKEY signed Diffie-Hellman protocol, DHHMAC
+ does not scale to any larger configurations beyond peer-to-peer
+ groups.
+
+5.4. Assumptions
+
+ This document states a couple of assumptions upon which the security
+ of DHHMAC significantly depends. The following conditions are
+ assumed:
+
+ * The parameters xi, xr, s, and auth_key are to be kept secret.
+
+ * The pre-shared key s has sufficient entropy and cannot be
+ effectively guessed.
+
+ * The pseudo-random function (PRF) is secure, yields the pseudo-
+ random property, and maintains the entropy.
+
+ * A sufficiently large and secure Diffie-Hellman group is applied.
+
+ * The Diffie-Hellman assumption holds saying basically that even with
+ knowledge of the exchanged Diffie-Hellman half-keys and knowledge
+ of the Diffie-Hellman group, it is infeasible to compute the TGK or
+ to derive the secret parameters xi or xr. The latter is also
+ called the discrete logarithm assumption. Please see [6], [9], or
+ [10] for more background information regarding the Diffie-Hellman
+ problem and its computational complexity assumptions.
+
+ * The hash function (SHA1) is secure; i.e., it is computationally
+ infeasible to find a message that corresponds to a given message
+ digest, or to find two different messages that produce the same
+ message digest.
+
+ * The HMAC algorithm is secure and does not leak the auth_key. In
+ particular, the security depends on the message authentication
+ property of the compression function of the hash function H when it
+ is applied to single blocks (see [5]).
+
+
+
+Euchner Standards Track [Page 19]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ * A source capable of producing sufficiently many bits of (pseudo)
+ randomness is available.
+
+ * The system upon which DHHMAC runs is sufficiently secure.
+
+5.5. Residual Risk
+
+ Although these detailed assumptions are non-negligible, security
+ experts generally believe that all these assumptions are reasonable
+ and that the assumptions made can be fulfilled in practice with
+ little or no expenses.
+
+ The mathematical and cryptographic assumptions of the properties of
+ the PRF, the Diffie-Hellman algorithm (discrete log-assumption), the
+ HMAC algorithm, and the SHA1 algorithms have been neither proven nor
+ disproven at this time.
+
+ Thus, a certain residual risk remains, which might threaten the
+ overall security at some unforeseeable time in the future.
+
+ The DHHMAC would be compromised as soon as any of the listed
+ assumptions no longer hold.
+
+ The Diffie-Hellman mechanism is a generic security technique that is
+ not only applicable to groups of prime order or of characteristic
+ two. This is because of the fundamental mathematical assumption that
+ the discrete logarithm problem is also a very hard one in general
+ groups. This enables Diffie-Hellman to be deployed also for GF(p)*,
+ for sub-groups of sufficient size, and for groups upon elliptic
+ curves. RSA does not allow such generalization, as the core
+ mathematical problem is a different one (large integer
+ factorization).
+
+ RSA asymmetric keys tend to become increasingly lengthy (1536 bits
+ and more) and thus very computationally intensive. Nevertheless,
+ Elliptic Curve Diffie-Hellman (ECDH) allows key lengths to be cut
+ down substantially (say 170 bits or more) while maintaining at least
+ the security level and providing even more significant performance
+ benefits in practice. Moreover, it is believed that elliptic-curve
+ techniques provide much better protection against side channel
+ attacks due to the inherent redundancy in the projective coordinates.
+ For all these reasons, one may view elliptic-curve-based Diffie-
+ Hellman as being more "future-proof" and robust against potential
+ threats than RSA is. Note that Elliptic Curve Diffie-Hellman
+ variants of MIKEY are defined in [31].
+
+
+
+
+
+
+Euchner Standards Track [Page 20]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ HMAC-SHA1 is a key security mechanism within DHHMAC on which the
+ overall security of MIKEY DHHMAC depends. MIKEY DHHMAC uses HMAC-
+ SHA1 in combination with the classic Diffie-Hellman key agreement
+ scheme. HMAC-SHA1 is a keyed one-way hash function that involves a
+ secret in its computation. DHHMAC applies HMAC-SHA1 for protection
+ of the MIKEY payload. Likewise, the pseudo-random function PRF
+ within MIKEY [2] uses the HMAC-SHA1 mechanism as a key derivation
+ function. While certain attacks have been reported against SHA1 and
+ MD5 (see [29]), with current knowledge (see [29], [30]), no attacks
+ have been reported against the HMAC-SHA1 security mechanism. In
+ fact, [32] proves that HMAC possesses the property of a pseudo-random
+ function PRF assuming solely that the (SHA1) hash function is a
+ pseudo-random function. [32] also provides evidence that HMAC is
+ robust against collision attacks on the underlying hash function. It
+ is believed that MIKEY DHHMAC should be considered secure enough for
+ the time being. Thus, there is no need to change the underlying
+ security mechanism within the MIKEY DHHMAC protocol.
+
+ It is not recommended to deploy DHHMAC for any other use than that
+ depicted in section 2. Any misapplication might lead to unknown,
+ undefined properties.
+
+5.6. Authorization and Trust Model
+
+ Basically, similar remarks on authorization as those stated in [2]
+ section 4.3.2 hold also for DHHMAC. However, as noted before, this
+ key management protocol does not serve full groups.
+
+ One may view the pre-established shared secret as yielding some pre-
+ established trust relationship between the initiator and the
+ responder. This results in a much simpler trust model for DHHMAC
+ than would be the case for some generic group key management protocol
+ and potential group entities without any pre-defined trust
+ relationship. In conjunction with the assumption of a shared key,
+ the common group controller simplifies the communication setup of the
+ entities.
+
+ One may view the pre-established trust relationship through the pre-
+ shared secret as some means for pre-granted, implied authorization.
+ This document does not define any particular authorization means but
+ leaves this subject to the application.
+
+6. Acknowledgments
+
+ This document incorporates kindly, valuable review feedback from
+ Steffen Fries, Hannes Tschofenig, Fredrick Lindholm, Mary Barnes, and
+ Russell Housley and general feedback by the MSEC WG.
+
+
+
+
+Euchner Standards Track [Page 21]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+7. IANA Considerations
+
+ This document does not define its own new name spaces for DHHMAC,
+ beyond the IANA name spaces that have been assigned for MIKEY; see
+ [2] sections 10 and 10.1 and IANA MIKEY payload name spaces [37].
+
+ In order to align Table 4.1.a with Table 6.1.a in [2], IANA is
+ requested to add the following entries to their MIKEY Payload Name
+ Space:
+
+ Data Type Value Reference
+ --------------- ----- ---------
+ DHHMAC init 7 RFC 4650
+ DHHMAC resp 8 RFC 4650
+
+8. References
+
+8.1. Normative References
+
+ [1] Bradner, S., "Key words for use in RFCs to Indicate Requirement
+ Levels", BCP 14, RFC 2119, March 1997.
+
+ [2] Arkko, J., Carrara, E., Lindholm, F., Naslund, M., and K.
+ Norrman, "MIKEY: Multimedia Internet KEYing", RFC 3830, August
+ 2004.
+
+ [3] NIST, FIBS-PUB 180-2, "Secure Hash Standard", April 1995,
+ http://csrc.nist.gov/publications/fips/fips180-2/
+ fips180-2withchangenotice.pdf.
+
+ [4] Arkko, J., Lindholm, F., Naslund, M., Norrman, K., and E.
+ Carrara, "Key Management Extensions for Session Description
+ Protocol (SDP) and Real Time Streaming Protocol (RTSP)", RFC
+ 4567, July 2006.
+
+ [5] Krawczyk, H., Bellare, M., and R. Canetti, "HMAC: Keyed-Hashing
+ for Message Authentication", RFC 2104, February 1997.
+
+8.2. Informative References
+
+ [6] A.J. Menezes, P. van Oorschot, S. A. Vanstone: "Handbook of
+ Applied Cryptography", CRC Press 1996.
+
+ [7] Rescorla, E. and B. Korver, "Guidelines for Writing RFC Text on
+ Security Considerations", BCP 72, RFC 3552, July 2003.
+
+ [8] Eastlake 3rd, D., Crocker, S., and J. Schiller, "Randomness
+ Recommendations for Security", RFC 1750, December 1994.
+
+
+
+Euchner Standards Track [Page 22]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ [9] Ueli M. Maurer, S. Wolf: "The Diffie-Hellman Protocol",
+ Designs, Codes, and Cryptography, Special Issue Public Key
+ Cryptography, Kluwer Academic Publishers, vol. 19, pp. 147-171,
+ 2000.
+ ftp://ftp.inf.ethz.ch/pub/crypto/publications/MauWol00c.ps.
+
+ [10] Discrete Logarithms and the Diffie-Hellman Protocol,
+ http://www.crypto.ethz.ch/research/ntc/dldh/.
+
+ [11] Dierks, T. and E. Rescorla, "The Transport Layer Security (TLS)
+ Protocol Version 1.1", RFC 4346, April 2006.
+
+ [12] Harkins, D. and D. Carrel, "The Internet Key Exchange (IKE)",
+ RFC 2409, November 1998.
+
+ [13] Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A.,
+ Peterson, J., Sparks, R., Handley, M., and E. Schooler, "SIP:
+ Session Initiation Protocol", RFC 3261, June 2002.
+
+ [14] Kaufman, C., "Internet Key Exchange (IKEv2) Protocol", RFC
+ 4306, December 2005.
+
+ [15] ITU-T Recommendation H.235.7: " H.323 Security framework: Usage
+ of the MIKEY Key Management Protocol for the Secure Real Time
+ Transport Protocol (SRTP) within H.235"; 9/2005.
+
+ [16] Schaad, J. and R. Housley, "Advanced Encryption Standard (AES)
+ Key Wrap Algorithm", RFC 3394, September 2002.
+
+ [17] Baugher, M., Weis, B., Hardjono, T., and H. Harney, "The Group
+ Domain of Interpretation", RFC 3547, July 2003.
+
+ [18] Harney, H., Meth, U., Colegrove, A., and G. Gross, "GSAKMP:
+ Group Secure Association Key Management Protocol", RFC 4535,
+ June 2006.
+
+ [19] Baugher, M., Canetti, R., Dondeti, L., and F. Lindholm,
+ "Multicast Security (MSEC) Group Key Management Architecture",
+ RFC 4046, April 2005.
+
+ [20] Baugher, M., McGrew, D., Naslund, M., Carrara, E., and K.
+ Norrman, "The Secure Real-time Transport Protocol (SRTP)", RFC
+ 3711, March 2004.
+
+ [21] ITU-T Recommendation H.235.0, " H.323 Security framework:
+ Security framework for H-series (H.323 and other H.245 based)
+ multimedia systems", (09/2005).
+
+
+
+
+Euchner Standards Track [Page 23]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ [22] Adams, C., Farrell, S., Kause, T., and T. Mononen, "Internet
+ X.509 Public Key Infrastructure Certificate Management Protocol
+ (CMP)", RFC 4210, September 2005.
+
+ [23] Myers, M., Ankney, R., Malpani, A., Galperin, S., and C. Adams,
+ "X.509 Internet Public Key Infrastructure Online Certificate
+ Status Protocol - OCSP", RFC 2560, June 1999.
+
+ [24] Adams, C., Sylvester, P., Zolotarev, M., and R. Zuccherato,
+ "Internet X.509 Public Key Infrastructure Data Validation and
+ Certification Server Protocols", RFC 3029, February 2001.
+
+ [25] Schaad, J., "Internet X.509 Public Key Infrastructure
+ Certificate Request Message Format (CRMF)", RFC 4211, September
+ 2005.
+
+ [26] Cooper, M., Dzambasow, Y., Hesse, P., Joseph, S., and R.
+ Nicholas, "Internet X.509 Public Key Infrastructure:
+ Certification Path Building", RFC 4158, September 2005.
+
+ [27] Rosenberg, J. and H. Schulzrinne, "An Offer/Answer Model with
+ Session Description Protocol (SDP)", RFC 3264, June 2002.
+
+ [37] IANA MIKEY Payload Name Spaces per RFC 3830, see
+ http://www.iana.org/assignments/mikey-payloads.
+
+ [29] Hoffman, P. and B. Schneier, "Attacks on Cryptographic Hashes
+ in Internet Protocols", RFC 4270, November 2005.
+
+ [30] Bellovin, S.M. and E.K. Rescorla: "Deploying a New Hash
+ Algorithm", October 2005,
+ http://www.cs.columbia.edu/~smb/papers/new-hash.pdf.
+
+ [31] Milne, A., Blaser, M., Brown, D., and L. Dondetti, "ECC
+ Algorithms For MIKEY", Work in Progress, June 2005.
+
+ [32] Bellare, M.: "New Proofs for NMAC and HMAC: Security Without
+ Collision-Resistance", http://eprint.iacr.org/2006/043.pdf,
+ November 2005.
+
+ [33] Ignjatic, D., Dondeti, L., Audet, F., and P. Lin, "An
+ additional mode of key Distribution in MIKEY: MIKEY-RSA-R",
+ Work in Progress, August 2006.
+
+
+
+
+
+
+
+
+Euchner Standards Track [Page 24]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+Appendix A. Usage of MIKEY-DHHMAC in H.235
+
+ This appendix provides informative overview how MIKEY-DHHMAC can be
+ applied in some H.323-based multimedia environments. Generally,
+ MIKEY is applicable for multimedia applications including IP
+ telephony. [15] describes various use cases of the MIKEY key
+ management protocols (MIKEY-PS, MIKEY-PK, MIKEY-DHSIGN and MIKEY-
+ DHHMAC) with the purpose to establish TGK keying material among H.323
+ endpoints. The TGKs are then used for media encryption by applying
+ SRTP [20]. Addressed scenarios include point-to-point with one or
+ more intermediate gatekeepers (trusted or partially trusted) in
+ between.
+
+ One particular use case addresses MIKEY-DHHMAC to establish a media
+ connection from an endpoint B calling (through a gatekeeper) to
+ another endpoint A that is located within that same gatekeeper zone.
+ While EP-A and EP-B typically do not share any auth_key a priori,
+ some separate protocol exchange means are achieved outside the actual
+ call setup procedure to establish an auth_key for the time while
+ endpoints are being registered with the gatekeeper; such protocols
+ exist [15] but are not shown in this document. The auth_key between
+ the endpoints is being used to authenticate and integrity protect the
+ MIKEY-DHHMAC messages.
+
+ To establish a call, it is assumed that endpoint B has obtained
+ permission from the gatekeeper (not shown). Endpoint B as the caller
+ builds the MIKEY-DHHMAC I_message (see section 3) and sends the
+ I_message encapsulated within the H.323-SETUP to endpoint A. A
+ routing gatekeeper (GK) would forward this message to endpoint B; in
+ case of a non-routing gatekeeper, endpoint B sends the SETUP directly
+ to endpoint A. In either case, H.323 inherent security mechanisms
+ [21] are applied to protect the (encapsulation) message during
+ transfer. This is not depicted here. The receiving endpoint A is
+ able to verify the conveyed I_message and can compute a TGK.
+ Assuming that endpoint A would accept the call, EP-A then builds the
+ MIKEY-DHHMAC R_message and sends the response as part of the
+ CallProceeding-to-Connect message back to the calling endpoint B
+ (possibly through a routing gatekeeper). Endpoint B processes the
+ conveyed R_message to compute the same TGK as the called endpoint A.
+
+ 1.) EP-B -> (GK) -> EP-A: SETUP(I_fwd_message [, I_rev_message])
+ 2.) EP-A -> (GK) -> EP-B: CallProceeding-to-CONNECT(R_fwd_message
+ [, R_rev_message])
+
+ Notes: If it is necessary to establish directional TGKs for full-
+ duplex links in both directions B->A and A->B, then the
+ calling endpoint B instantiates the DHHMAC protocol twice:
+ once in the direction B->A using I_fwd_message and another run
+
+
+
+Euchner Standards Track [Page 25]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+ in parallel in the direction A->B using I_rev_message. In
+ that case, two MIKEY-DHHMAC I_messages are encapsulated within
+ SETUP (I_fwd_message and I_rev_message) and two MIKEY-DHHMAC
+ R_messages (R_fwd_message and R_rev_message) are encapsulated
+ within CallProceeding-to-CONNECT. The I_rev_message
+ corresponds with the I_fwd_message. Alternatively, the called
+ endpoint A may instantiate the DHHMAC protocol in a separate
+ run with endpoint B (not shown); however, this requires a
+ third handshake to complete.
+
+ For more details on how the MIKEY protocols may be deployed
+ with H.235, please refer to [15].
+
+Author's Address
+
+ Martin Euchner
+ Hofmannstr. 51
+ 81359 Munich, Germany
+
+ Phone: +49 89 722 55790
+ Fax: +49 89 722 62366
+ EMail: martin_euchner@hotmail.com
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Euchner Standards Track [Page 26]
+
+RFC 4650 HMAC-Authenticated Diffie-Hellman for MIKEY September 2006
+
+
+Full Copyright Statement
+
+ Copyright (C) The Internet Society (2006).
+
+ This document is subject to the rights, licenses and restrictions
+ contained in BCP 78, and except as set forth therein, the authors
+ retain all their rights.
+
+ This document and the information contained herein are provided on an
+ "AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
+ OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
+ ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
+ INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
+ INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
+ WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
+
+Intellectual Property
+
+ The IETF takes no position regarding the validity or scope of any
+ Intellectual Property Rights or other rights that might be claimed to
+ pertain to the implementation or use of the technology described in
+ this document or the extent to which any license under such rights
+ might or might not be available; nor does it represent that it has
+ made any independent effort to identify any such rights. Information
+ on the procedures with respect to rights in RFC documents can be
+ found in BCP 78 and BCP 79.
+
+ Copies of IPR disclosures made to the IETF Secretariat and any
+ assurances of licenses to be made available, or the result of an
+ attempt made to obtain a general license or permission for the use of
+ such proprietary rights by implementers or users of this
+ specification can be obtained from the IETF on-line IPR repository at
+ http://www.ietf.org/ipr.
+
+ The IETF invites any interested party to bring to its attention any
+ copyrights, patents or patent applications, or other proprietary
+ rights that may cover technology that may be required to implement
+ this standard. Please address the information to the IETF at
+ ietf-ipr@ietf.org.
+
+Acknowledgement
+
+ Funding for the RFC Editor function is provided by the IETF
+ Administrative Support Activity (IASA).
+
+
+
+
+
+
+
+Euchner Standards Track [Page 27]
+