summaryrefslogtreecommitdiff
path: root/doc/rfc/rfc5458.txt
diff options
context:
space:
mode:
Diffstat (limited to 'doc/rfc/rfc5458.txt')
-rw-r--r--doc/rfc/rfc5458.txt1459
1 files changed, 1459 insertions, 0 deletions
diff --git a/doc/rfc/rfc5458.txt b/doc/rfc/rfc5458.txt
new file mode 100644
index 0000000..d8fe55a
--- /dev/null
+++ b/doc/rfc/rfc5458.txt
@@ -0,0 +1,1459 @@
+
+
+
+
+
+
+Network Working Group H. Cruickshank
+Request for Comments: 5458 University of Surrey
+Category: Informational P. Pillai
+ University of Bradford
+ M. Noisternig
+ University of Salzburg
+ S. Iyengar
+ Logica
+ March 2009
+
+
+ Security Requirements for
+ the Unidirectional Lightweight Encapsulation (ULE) Protocol
+
+Status of This Memo
+
+ This memo provides information for the Internet community. It does
+ not specify an Internet standard of any kind. Distribution of this
+ memo is unlimited.
+
+Copyright Notice
+
+ Copyright (c) 2009 IETF Trust and the persons identified as the
+ document authors. All rights reserved.
+
+ This document is subject to BCP 78 and the IETF Trust's Legal
+ Provisions Relating to IETF Documents in effect on the date of
+ publication of this document (http://trustee.ietf.org/license-info).
+ Please review these documents carefully, as they describe your rights
+ and restrictions with respect to this document.
+
+Abstract
+
+ The MPEG-2 standard defined by ISO 13818-1 supports a range of
+ transmission methods for a variety of services. This document
+ provides a threat analysis and derives the security requirements when
+ using the Transport Stream, TS, to support an Internet network-layer
+ using Unidirectional Lightweight Encapsulation (ULE) defined in RFC
+ 4326. The document also provides the motivation for link-layer
+ security for a ULE Stream. A ULE Stream may be used to send IPv4
+ packets, IPv6 packets, and other Protocol Data Units (PDUs) to an
+ arbitrarily large number of Receivers supporting unicast and/or
+ multicast transmission.
+
+ The analysis also describes applicability to the Generic Stream
+ Encapsulation (GSE) defined by the Digital Video Broadcasting (DVB)
+ Project.
+
+
+
+
+Cruickshank, et al. Informational [Page 1]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+Table of Contents
+
+ 1. Introduction ....................................................3
+ 2. Requirements Notation ...........................................4
+ 3. Threat Analysis .................................................7
+ 3.1. System Components ..........................................7
+ 3.2. Threats ....................................................9
+ 3.3. Threat Cases ..............................................10
+ 4. Security Requirements for IP over MPEG-2 TS ....................11
+ 5. Design Recommendations for ULE Security Extension Header .......14
+ 6. Compatibility with Generic Stream Encapsulation ................15
+ 7. Summary ........................................................15
+ 8. Security Considerations ........................................15
+ 9. Acknowledgments ................................................16
+ 10. References ....................................................16
+ 10.1. Normative References .....................................16
+ 10.2. Informative References ...................................17
+ Appendix A. ULE Security Framework ................................19
+ A.1. Building Block ............................................19
+ A.2. Interface Definition ......................................22
+ Appendix B. Motivation for ULE Link-Layer Security ................23
+ B.1. Security at the IP Layer (Using IPsec) ....................23
+ B.2. Link Security below the Encapsulation Layer ...............24
+ B.3. Link Security as a Part of the Encapsulation Layer ........25
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 2]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+1. Introduction
+
+ The MPEG-2 Transport Stream (TS) has been widely accepted not only
+ for providing digital TV services, but also as a subnetwork
+ technology for building IP networks. RFC 4326 [RFC4326] describes
+ the Unidirectional Lightweight Encapsulation (ULE) mechanism for the
+ transport of IPv4 and IPv6 Datagrams and other network protocol
+ packets directly over the ISO MPEG-2 Transport Stream as TS Private
+ Data. ULE specifies a base encapsulation format and supports an
+ Extension Header format that allows it to carry additional header
+ information to assist in network/Receiver processing. The
+ encapsulation satisfies the design and architectural requirement for
+ a lightweight encapsulation defined in RFC 4259 [RFC4259].
+
+ Section 3.1 of RFC 4259 presents several topological scenarios for
+ MPEG-2 Transmission Networks. A summary of these scenarios is
+ presented below:
+
+ A. Broadcast TV and Radio Delivery. This is not within the scope of
+ this document.
+
+ B. Broadcast Networks used as an ISP. This resembles scenario A, but
+ includes IP services to access the public Internet.
+
+ C. Unidirectional Star IP Scenario. This provides a data network
+ delivering a common bit stream to typically medium-sized groups of
+ Receivers.
+
+ D. Datacast Overlay. This employs MPEG-2 physical and link layers to
+ provide additional connectivity such as unidirectional multicast
+ to supplement an existing IP-based Internet service.
+
+ E. Point-to-Point Links. This connectivity may be provided using a
+ pair of transmit and receive interfaces.
+
+ F. Two-Way IP Networks.
+
+ RFC 4259 states that ULE must be robust to errors and security
+ threats. Security must also consider both unidirectional (A, B, C,
+ and D) as well as bidirectional (E and F) links for the scenarios
+ mentioned above.
+
+ An initial analysis of the security requirements in MPEG-2
+ transmission networks is presented in the "Security Considerations"
+ section of RFC 4259. For example, when such networks are not using a
+ wireline network, the normal security issues relating to the use of
+ wireless links for transport of Internet traffic should be considered
+ [RFC3819].
+
+
+
+Cruickshank, et al. Informational [Page 3]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ The security considerations of RFC 4259 recommend that any new
+ encapsulation defined by the IETF should allow Transport Stream
+ encryption and should also support optional link-layer authentication
+ of the Subnetwork Data Unit (SNDU) payload. In ULE [RFC4326], it is
+ suggested that this may be provided in a flexible way using Extension
+ Headers. This requires the definition of a mandatory Extension
+ Header, but has the advantage that it decouples specification of the
+ security functions from the encapsulation functions.
+
+ This document extends the above analysis and derives in detail the
+ security requirements for ULE in MPEG-2 transmission networks.
+
+ A security framework for deployment of secure ULE networks describing
+ the different building blocks and the interface definitions is
+ presented in Appendix A.
+
+2. Requirements Notation
+
+ The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
+ "SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
+ document are to be interpreted as described in RFC 2119 [RFC2119].
+
+ Other terms used in this document are defined below:
+
+ ATSC: Advanced Television Systems Committee. A framework and a set
+ of associated standards for the transmission of video, audio, and
+ data using the ISO MPEG-2 Standard.
+
+ DVB: Digital Video Broadcast. A framework and set of associated
+ standards published by the European Telecommunications Standards
+ Institute (ETSI) for the transmission of video, audio, and data using
+ the ISO MPEG-2 Standard [ISO-MPEG2].
+
+ Encapsulator: A network device that receives Protocol Data Units
+ (PDUs) and formats these into Payload Units (known here as SNDUs) for
+ output as a stream of TS Packets.
+
+ GCKS: Group Controller and Key Server. A server that authenticates
+ and provides the policy and keying material to members of a secure
+ group.
+
+ LLC: Logical Link Control [ISO-8802], [IEEE-802]. A link-layer
+ protocol defined by the IEEE 802 standard, which follows the Ethernet
+ Medium Access Control Header.
+
+ MAC: Message Authentication Code.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 4]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ MPE: Multiprotocol Encapsulation [ETSI-DAT]. A scheme that
+ encapsulates PDUs, forming a Digital Storage Media Command and
+ Control (DSM-CC) Table Section. Each Section is sent in a series of
+ TS Packets using a single TS Logical Channel.
+
+ MPEG-2: A set of standards specified by the Motion Picture Experts
+ Group (MPEG) and standardised by the International Standards
+ Organisation (ISO/IEC 13818-1) [ISO-MPEG2], and ITU-T (in H.222
+ [ITU-H222]).
+
+ NPA: Network Point of Attachment. In this document, refers to a
+ 6-byte destination address (resembling an IEEE Medium Access Control
+ address) within the MPEG-2 transmission network that is used to
+ identify individual Receivers or groups of Receivers.
+
+ PDU: Protocol Data Unit. Examples of a PDU include Ethernet frames,
+ IPv4 or IPv6 Datagrams, and other network packets.
+
+ PID: Packet Identifier [ISO-MPEG2]. A 13-bit field carried in the
+ header of TS Packets. This is used to identify the TS Logical
+ Channel to which a TS Packet belongs [ISO-MPEG2]. The TS Packets
+ forming the parts of a Table Section, Packetised Elementary Stream
+ (PES), or other Payload Unit must all carry the same PID value. The
+ all-zeros PID 0x0000 as well as other PID values are reserved for
+ specific PSI/SI Tables [ISO-MPEG2]. The all-ones PID value 0x1FFF
+ indicates a Null TS Packet introduced to maintain a constant bit rate
+ of a TS Multiplex. There is no required relationship between the PID
+ values used for TS Logical Channels transmitted using different TS
+ Multiplexes.
+
+ Receiver: Equipment that processes the signal from a TS Multiplex and
+ performs filtering and forwarding of encapsulated PDUs to the
+ network-layer service (or bridging module when operating at the link
+ layer).
+
+ SI Table: Service Information Table [ISO-MPEG2]. In this document,
+ this term describes a table that is defined by another standards body
+ to convey information about the services carried in a TS Multiplex.
+ A Table may consist of one or more Table Sections; however, all
+ sections of a particular SI Table must be carried over a single TS
+ Logical Channel [ISO-MPEG2].
+
+ SNDU: SubNetwork Data Unit. An encapsulated PDU sent as an MPEG-2
+ Payload Unit.
+
+ TS: Transport Stream [ISO-MPEG2]. A method of transmission at the
+ MPEG-2 layer using TS Packets; it represents Layer 2 of the ISO/OSI
+ reference model. See also TS Logical Channel and TS Multiplex.
+
+
+
+Cruickshank, et al. Informational [Page 5]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ TS Multiplex: In this document, this term defines a set of MPEG-2 TS
+ Logical Channels sent over a single lower-layer connection. This may
+ be a common physical link (i.e., a transmission at a specified symbol
+ rate, Forward Error Correction (FEC) setting, and transmission
+ frequency) or an encapsulation provided by another protocol layer
+ (e.g., Ethernet, or RTP over IP). The same TS Logical Channel may be
+ repeated over more than one TS Multiplex (possibly associated with a
+ different PID value) [RFC4259]; for example, to redistribute the same
+ multicast content to two terrestrial TV transmission cells.
+
+ TS Packet: A fixed-length 188-byte unit of data sent over a TS
+ Multiplex [ISO-MPEG2]. Each TS Packet carries a 4-byte header, plus
+ optional overhead including an Adaptation Field, encryption details,
+ and time stamp information to synchronise a set of related TS Logical
+ Channels.
+
+ ULE Stream: An MPEG-2 TS Logical Channel that carries only ULE
+ encapsulated PDUs. ULE Streams may be identified by definition of a
+ stream_type in SI/PSI [ISO-MPEG2].
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 6]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+3. Threat Analysis
+
+3.1. System Components
+
+ +------------+ +------------+
+ | IP | | IP |
+ | End Host | | End Host |
+ +-----+------+ +------------+
+ | ^
+ +------------>+---------------+ |
+ + ULE | |
+ +-------------+ Encapsulator | |
+ SI-Data | +------+--------+ |
+ +-------+-------+ |MPEG-2 TS Logical Channel |
+ | MPEG-2 | | |
+ | SI Tables | | |
+ +-------+-------+ ->+------+--------+ |
+ | -->| MPEG-2 | . . .
+ +------------>+ Multiplexer | |
+ MPEG-2 TS +------+--------+ |
+ Logical Channel |MPEG-2 TS Mux |
+ | |
+ Other ->+------+--------+ |
+ MPEG-2 -->+ MPEG-2 | |
+ TS --->+ Multiplexer | |
+ ---->+------+--------+ |
+ |MPEG-2 TS Mux |
+ | |
+ +------+--------+ +------+-----+
+ |Physical Layer | | MPEG-2 |
+ |Modulator +---------->+ Receiver |
+ +---------------+ MPEG-2 +------------+
+ TS Mux
+
+ Figure 1: An example configuration for a unidirectional service
+ for IP transport over MPEG-2 (adapted from [RFC4259])
+
+ As shown in Figure 1 above (from Section 3.3 of [RFC4259]), there are
+ several entities within the MPEG-2 transmission network architecture.
+ These include:
+
+ o ULE Encapsulation Gateways (the ULE Encapsulator)
+
+ o SI-Table signalling generator (input to the multiplexer)
+
+ o Receivers (the endpoints for ULE Streams)
+
+ o TS multiplexers (including re-multiplexers)
+
+
+
+Cruickshank, et al. Informational [Page 7]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ o Modulators
+
+ The TS Packets are carried to the Receiver over a physical layer that
+ usually includes Forward Error Correction (FEC) coding that
+ interleaves the bytes of several consecutive, but unrelated, TS
+ Packets. FEC-coding and synchronisation processing makes injection
+ of single TS Packets very difficult. Replacement of a sequence of
+ packets is also difficult, but possible (see Section 3.2).
+
+ A Receiver in an MPEG-2 TS transmission network needs to identify a
+ TS Logical Channel (or MPEG-2 Elementary Stream) to reassemble the
+ fragments of PDUs sent by an L2 source [RFC4259]. In an MPEG-2 TS,
+ this association is made via the Packet Identifier, PID [ISO-MPEG2].
+ At the sender, each source associates a locally unique set of PID
+ values with each stream it originates. However, there is no required
+ relationship between the PID value used at the sender and that
+ received at the Receiver. Network devices may re-number the PID
+ values associated with one or more TS Logical Channels (e.g., ULE
+ Streams) to prevent clashes at a multiplexer between input streams
+ with the same PID carried on different input multiplexes (updating
+ entries in the PMT [ISO-MPEG2], and other SI tables that reference
+ the PID value). A device may also modify and/or insert new SI data
+ into the control plane (also sent as TS Packets identified by their
+ PID value). However, there is only one valid source of data for each
+ MPEG-2 Elementary Stream, bound to a PID value. (This observation
+ could simplify the requirement for authentication of the source of a
+ ULE Stream.)
+
+ In an MPEG-2 network, a set of signalling messages [RFC4947] may need
+ to be broadcast (e.g., by an Encapsulation Gateway or other device)
+ to form the L2 control plane. Examples of signalling messages
+ include the Program Association Table (PAT), Program Map Table (PMT),
+ and Network Information Table (NIT). In existing MPEG-2 transmission
+ networks, these messages are broadcast in the clear (no encryption or
+ integrity checks). The integrity as well as authenticity of these
+ messages is important for correct working of the ULE network, i.e.,
+ supporting its security objectives in the area of availability, in
+ addition to confidentiality and integrity. One method recently
+ proposed [RFC5163] encapsulates these messages using ULE. In such
+ cases all the security requirements of this document apply in
+ securing these signalling messages.
+
+ ULE Stream security only concerns the security between the ULE
+ Encapsulation Gateway (ULE Encapsulator) and the Receiver. In many
+ deployment scenarios the user of a ULE Stream has to secure
+ communications beyond the link since other network links are utilised
+ in addition to the ULE link. Therefore, if authentication of the
+ endpoints, i.e., the IP Sources, is required, or users are concerned
+
+
+
+Cruickshank, et al. Informational [Page 8]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ about loss of confidentiality, integrity, or authenticity of their
+ communication data, they will have to employ end-to-end network
+ security mechanisms, e.g., IPsec or Transport Layer Security (TLS).
+ Governmental users may be forced by regulations to employ specific
+ approved implementations of those mechanisms. Hence, for such cases,
+ the requirements for confidentiality and integrity of the user data
+ will be met by the end-to-end security mechanism and the ULE security
+ measures would focus on providing traffic flow confidentiality either
+ for user data that has already been encrypted or for users who choose
+ not to implement end-to-end security mechanisms.
+
+ ULE links may also be used for communications where the two IP
+ endpoints are not under central control (e.g., when browsing a public
+ web site). In these cases, it may be impossible to enforce any end-
+ to-end security mechanisms. Yet, a common objective is that users
+ may make the same security assumptions as for wired links [RFC3819].
+ ULE security could achieve this by protecting the vulnerable (in
+ terms of passive attacks) ULE Stream.
+
+ In contrast to the above, a ULE Stream can be used to link networks
+ such as branch offices to a central office. ULE link-layer security
+ could be the sole provider of confidentiality and integrity. In this
+ scenario, users requiring high assurance of security (e.g.,
+ government use) will need to employ approved cryptographic equipment
+ (e.g., at the network layer). An implementation of ULE Link Security
+ equipment could also be certified for use by specific user
+ communities.
+
+3.2. Threats
+
+ The simplest type of network threat is a passive threat. This
+ includes eavesdropping or monitoring of transmissions, with a goal to
+ obtain information that is being transmitted. In broadcast networks
+ (especially those utilising widely available low-cost physical layer
+ interfaces, such as DVB), the passive threats are the major threats.
+ One example is an intruder monitoring the MPEG-2 transmission
+ broadcast and then extracting the data carried within the link.
+ Another example is an intruder trying to determine the identity of
+ the communicating parties and the volume of their traffic by sniffing
+ (L2) addresses. This is a well-known issue in the security field;
+ however, it is more of a problem in the case of broadcast networks
+ such as MPEG-2 transmission networks because of the easy availability
+ of Receiver hardware and the wide geographical span of the networks.
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 9]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ Active threats (or attacks) are, in general, more difficult to
+ implement successfully than passive threats, and usually require more
+ sophisticated resources and may require access to the transmitter.
+ Within the context of MPEG-2 transmission networks, examples of
+ active attacks are:
+
+ o Masquerading: An entity pretends to be a different entity. This
+ includes masquerading other users and subnetwork control plane
+ messages.
+
+ o Modification of messages in an unauthorised manner.
+
+ o Replay attacks: When an intruder sends some old (authentic)
+ messages to the Receiver. In the case of a broadcast link, access
+ to previous broadcast data is easy.
+
+ o Denial-of-Service (DoS) attacks: When an entity fails to perform
+ its proper function or acts in a way that prevents other entities
+ from performing their proper functions.
+
+ The active threats mentioned above are major security concerns for
+ the Internet community [BELLOVIN]. Masquerading and modification of
+ IP packets are comparatively easy in an Internet environment, whereas
+ such attacks are in fact much harder for MPEG-2 broadcast links.
+ This could, for instance, motivate the mandatory use of sequence
+ numbers in IPsec, but not for synchronous links. This is further
+ reflected in the security requirements for Case 2 and 3 in Section 4
+ below.
+
+ As explained in Section 3.1, the PID associated with an Elementary
+ Stream can be modified (e.g., in some systems by reception of an
+ updated SI table, or in other systems until the next
+ announcement/discovery data is received). An attacker that is able
+ to modify the content of the received multiplex (e.g., replay data
+ and/or control information) could inject data locally into the
+ received stream with an arbitrary PID value.
+
+3.3. Threat Cases
+
+ Analysing the topological scenarios for MPEG-2 Transmission Networks
+ in Section 1, the security threats can be abstracted into three
+ cases:
+
+ o Case 1: Monitoring (passive threat). Here the intruder monitors
+ the ULE broadcasts to gain information about the ULE data and/or
+ tracking the communicating parties identities (by monitoring the
+ destination NPA address). In this scenario, measures must be taken
+ to protect the ULE payload data and the identity of ULE Receivers.
+
+
+
+Cruickshank, et al. Informational [Page 10]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ o Case 2: Locally conducting active attacks on the MPEG-TS multiplex.
+ Here an intruder is assumed to be sufficiently sophisticated to
+ override the original transmission from the ULE Encapsulation
+ Gateway and deliver a modified version of the MPEG-TS transmission
+ to a single ULE Receiver or a small group of Receivers (e.g., in a
+ single company site). The MPEG-2 transmission network operator
+ might not be aware of such attacks. Measures must be taken to
+ ensure ULE data integrity and authenticity and preventing replay of
+ old messages.
+
+ o Case 3: Globally conducting active attacks on the MPEG-TS
+ multiplex. This assumes a sophisticated intruder able to override
+ the whole MPEG-2 transmission multiplex. The requirements are
+ similar to case 2. The MPEG-2 transmission network operator can
+ usually identify such attacks and provide corrective action to
+ restore the original transmission.
+
+ For both Cases 2 and 3, there can be two sub-cases:
+
+ o Insider attacks, i.e., active attacks from adversaries within the
+ network with knowledge of the secret material.
+
+ o Outsider attacks, i.e., active attacks from adversaries without
+ knowledge of the secret material.
+
+ In terms of priority, Case 1 is considered the major threat in MPEG-2
+ transmission systems. Case 2 is considered a lesser threat,
+ appropriate to specific network configurations, especially when
+ vulnerable to insider attacks. Case 3 is less likely to be found in
+ an operational network, and is expected to be noticed by the MPEG-2
+ transmission operator. It will require restoration of the original
+ transmission. The assumption being that physical access to the
+ network components (multiplexers, etc.) and/or connecting physical
+ media is secure. Therefore, Case 3 is not considered further in this
+ document.
+
+4. Security Requirements for IP over MPEG-2 TS
+
+ From the threat analysis in Section 3, the following security
+ requirements can be derived:
+
+ Req 1. Data confidentiality MUST be provided by a link that supports
+ ULE Stream Security to prevent passive attacks and reduce the risk
+ of active threats.
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 11]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ Req 2. Protection of L2 NPA address is OPTIONAL. In broadcast
+ networks, this protection can be used to prevent an intruder
+ tracking the identity of ULE Receivers and the volume of their
+ traffic.
+
+ Req 3. Integrity protection and source authentication of ULE Stream
+ data are OPTIONAL. These can be used to prevent the active
+ attacks described in Section 3.2.
+
+ Req 4. Protection against replay attacks is OPTIONAL. This is used
+ to counter the active attacks described in Section 3.2.
+
+ Req 5. L2 ULE Source and Receiver authentication is OPTIONAL. This
+ can be performed during the initial key exchange and
+ authentication phase, before the ULE Receiver can join a secure
+ session with the ULE Encapsulator (ULE source). This could be
+ either unidirectional or bidirectional authentication based on the
+ underlying key management protocol.
+
+ Other general requirements for all threat cases for link-layer
+ security are:
+
+ GReq (a) ULE key management functions MUST be decoupled from ULE
+ security services such as encryption and source authentication.
+ This allows the independent development of both systems.
+
+ GReq (b) Support SHOULD be provided for automated as well as manual
+ insertion of keys and policy into the relevant databases.
+
+ GReq (c) Algorithm agility MUST be supported. It should be possible
+ to update the crypto algorithms and hashes when they become
+ obsolete without affecting the overall security of the system.
+
+ GReq (d) The security extension header MUST be compatible with other
+ ULE extension headers. The method must allow other extension
+ headers (either mandatory or optional) to be used in combination
+ with a security extension. It is RECOMMENDED that these are
+ placed after the security extension header. This permits full
+ protection for all headers. It also avoids situations where the
+ SNDU has to be discarded on processing the security extension
+ header, while preceding headers have already been evaluated. One
+ exception is the Timestamp extension that SHOULD precede the
+ security extension header [RFC5163]. In this case, the timestamp
+ will be unaffected by security services such as data
+ confidentiality and can be decoded without the need for key
+ material.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 12]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ Examining the threat cases in Section 3.3, the security requirements
+ for each case can be summarised as:
+
+ o Case 1: Data confidentiality (Req 1) MUST be provided to prevent
+ monitoring of the ULE data (such as user information and IP
+ addresses). Protection of NPA addresses (Req 2) MAY be provided to
+ prevent tracking ULE Receivers and their communications.
+
+ o Case 2: In addition to Case 1 requirements, new measures MAY be
+ implemented such as authentication schemes using Message
+ Authentication Codes, digital signatures, or Timed Efficient Stream
+ Loss-Tolerant Authentication (TESLA) [RFC4082] in order to provide
+ integrity protection and source authentication (Reqs 3 and 5). In
+ addition, sequence numbers (Req 4) MAY be used to protect against
+ replay attacks. In terms of outsider attacks, group authentication
+ using Message Authentication Codes can provide the required level
+ of security (Reqs 3 and 5). This will significantly reduce the
+ ability of intruders to successfully inject their own data into the
+ MPEG-TS stream. However, scenario 2 threats apply only in specific
+ service cases, and therefore authentication and protection against
+ replay attacks are OPTIONAL. Such measures incur additional
+ transmission as well as processing overheads. Moreover, intrusion
+ detection systems may also be needed by the MPEG-2 network
+ operator. These should best be coupled with perimeter security
+ policy to monitor common DoS attacks.
+
+ o Case 3: As stated in Section 3.3, the requirements here are similar
+ to Case 2, but since the MPEG-2 transmission network operator can
+ usually identify such attacks, the constraints on intrusion
+ detections are less than in Case 2.
+
+ Table 1 below shows the threats that are applicable to ULE networks,
+ and the relevant security mechanisms to mitigate those threats.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 13]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ Security Mechanism
+ -----------------------------------------------
+ |Data |Data |Source |Data |Intru |Iden |
+ |Privacy |fresh |Authent|Integ |sion |tity |
+ | |ness |ication|rity |Dete |Prote |
+ | | | | |ction |ction |
+ Threat | | | | | | |
+ ---------------|--------|-------|-------|-------|-------|------|
+ | Monitoring | X | - | - | - | - | X |
+ |---------------------------------------------------------------|
+ | Masquerading | X | - | X | X | - | X |
+ |---------------------------------------------------------------|
+ | Replay Attacks| - | X | X | X | X | - |
+ |---------------------------------------------------------------|
+ | DoS Attacks | - | X | X | X | X | - |
+ |---------------------------------------------------------------|
+ | Modification | - | - | X | X | X | - |
+ | of Messages | | | | | | |
+ ---------------------------------------------------------------
+
+ Table 1: Security techniques to mitigate network threats
+ in ULE Networks
+
+5. Design Recommendations for ULE Security Extension Header
+
+ Table 1 may assist in selecting fields within a ULE Security
+ Extension Header framework.
+
+ Security services may be grouped into profiles based on security
+ requirements, e.g., a base profile (with payload encryption and
+ identity protection) and a second profile that extends this to also
+ provide source authentication and protection against replay attacks.
+ Although the use of specific security techniques is optional, it is
+ RECOMMENDED that receiver devices should implement all the techniques
+ in Reqs 2-5 of Section 4 to ensure interoperability of all profiles.
+
+ A modular design of ULE security may allow it to use and benefit from
+ existing key management protocols, such as the Group Secure
+ Association Key Management Protocol (GSAKMP) [RFC4535] and the Group
+ Domain of Interpretation (GDOI) [RFC3547] defined by the IETF
+ Multicast Security (MSEC) working group. This does not preclude the
+ use of other key management methods in scenarios where this is more
+ appropriate.
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 14]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ IPsec [RFC4301] and TLS [RFC5246] also provide a proven security
+ architecture defining key exchange mechanisms and the ability to use
+ a range of cryptographic algorithms. ULE security can make use of
+ these established mechanisms and algorithms. See Appendix A for more
+ details.
+
+6. Compatibility with Generic Stream Encapsulation
+
+ RFC 5163 [RFC5163] describes three new Extension Headers that may be
+ used with Unidirectional Link Encapsulation, ULE, [RFC4326] and the
+ Generic Stream Encapsulation (GSE) that has been designed for the
+ Generic Mode (also known as the Generic Stream (GS)), offered by
+ second-generation DVB physical layers [GSE].
+
+ The security threats and requirements presented in this document are
+ applicable to ULE and GSE encapsulations.
+
+7. Summary
+
+ This document analyses a set of threats and security requirements.
+ It defines the requirements for ULE security and states the
+ motivation for link security as a part of the Encapsulation layer.
+
+ ULE security must provide link-layer encryption and ULE Receiver
+ identity protection. The framework must support the optional ability
+ to provide for link-layer authentication and integrity assurance, as
+ well as protection against insertion of old (duplicated) data into
+ the ULE Stream (i.e., replay protection). This set of features is
+ optional to reduce encapsulation overhead when not required.
+
+ ULE Stream security between a ULE Encapsulation Gateway and the
+ corresponding Receiver(s) is considered an additional security
+ mechanism to IPsec, TLS, and application layer end-to-end security,
+ and not as a replacement. It allows a network operator to provide
+ similar functions to that of IPsec, but in addition provides MPEG-2
+ transmission link confidentiality and protection of ULE Receiver
+ identity (NPA address).
+
+ Appendix A describes a set of building blocks that may be used to
+ realise a framework that provides ULE security functions.
+
+8. Security Considerations
+
+ Link-layer (L2) encryption of IP traffic is commonly used in
+ broadcast/radio links to supplement end-to-end security (e.g.,
+ provided by TLS [RFC5246], SSH [RFC4251], IPsec [RFC4301]).
+
+
+
+
+
+Cruickshank, et al. Informational [Page 15]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ A common objective is to provide the same level of privacy as wired
+ links. It is recommended that an ISP or user provide end-to-end
+ security services based on well-known mechanisms such as IPsec or
+ TLS.
+
+ This document provides a threat analysis and derives the security
+ requirements to provide link encryption and optional link-layer
+ integrity/authentication of the SNDU payload.
+
+ There are some security issues that were raised in RFC 4326 [RFC4326]
+ that are not addressed in this document (i.e., are out of scope),
+ e.g.:
+
+ o The security issue with un-initialised stuffing bytes. In ULE,
+ these bytes are set to 0xFF (normal practice in MPEG-2).
+
+ o Integrity issues related to the removal of the LAN FCS in a bridged
+ networking environment. The removal of bridged frames exposes the
+ traffic to potentially undetected corruption while being processed
+ by the Encapsulator and/or Receiver.
+
+ o There is a potential security issue when a Receiver receives a PDU
+ with two Length fields. The Receiver would need to validate the
+ actual length and the Length field and ensure that inconsistent
+ values are not propagated by the network.
+
+9. Acknowledgments
+
+ The authors acknowledge the help and advice from Gorry Fairhurst
+ (University of Aberdeen). The authors also acknowledge contributions
+ from Laurence Duquerroy and Stephane Coombes (ESA), and Yim Fun Hu
+ (University of Bradford).
+
+10. References
+
+10.1. Normative References
+
+ [ISO-MPEG2] "Information technology -- generic coding of moving
+ pictures and associated audio information systems, Part
+ I", ISO 13818-1, International Standards Organisation
+ (ISO), 2000.
+
+ [RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
+ Requirement Levels", BCP 14, RFC 2119, March 1997.
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 16]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ [RFC4326] Fairhurst, G. and B. Collini-Nocker, "Unidirectional
+ Lightweight Encapsulation (ULE) for Transmission of IP
+ Datagrams over an MPEG-2 Transport Stream (TS)", RFC
+ 4326, December 2005.
+
+10.2. Informative References
+
+ [BELLOVIN] S. Bellovin, "Security Problems in the TCP/IP Protocol
+ Suite", Computer Communications Review 2:19, pp. 32-48,
+ April 1989. http://www.cs.columbia.edu/~smb/
+
+ [ETSI-DAT] EN 301 192, "Digital Video Broadcasting (DVB); DVB
+ Specifications for Data Broadcasting", European
+ Telecommunications Standards Institute (ETSI).
+
+ [GSE] TS 102 606, "Digital Video Broadcasting (DVB); Generic
+ Stream Encapsulation (GSE) Protocol, "European
+ Telecommunication Standards, Institute (ETSI), 2007.
+
+ [IEEE-802] "Local and metropolitan area networks-Specific
+ requirements Part 2: Logical Link Control", IEEE 802.2,
+ IEEE Computer Society, (also ISO/IEC 8802-2), 1998.
+
+ [ISO-8802] ISO/IEC 8802.2, "Logical Link Control", International
+ Standards Organisation (ISO), 1998.
+
+ [ITU-H222] H.222.0, "Information technology, Generic coding of
+ moving pictures and associated audio information
+ Systems", International Telecommunication Union, (ITU-T),
+ 1995.
+
+ [RFC3135] Border, J., Kojo, M., Griner, J., Montenegro, G., and Z.
+ Shelby, "Performance Enhancing Proxies Intended to
+ Mitigate Link-Related Degradations", RFC 3135, June 2001.
+
+ [RFC3547] Baugher, M., Weis, B., Hardjono, T., and H. Harney, "The
+ Group Domain of Interpretation", RFC 3547, July 2003.
+
+ [RFC3715] Aboba, B. and W. Dixon, "IPsec-Network Address
+ Translation (NAT) Compatibility Requirements", RFC 3715,
+ March 2004.
+
+ [RFC3819] Karn, P., Ed., Bormann, C., Fairhurst, G., Grossman, D.,
+ Ludwig, R., Mahdavi, J., Montenegro, G., Touch, J., and
+ L. Wood, "Advice for Internet Subnetwork Designers", BCP
+ 89, RFC 3819, July 2004.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 17]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ [RFC4082] Perrig, A., Song, D., Canetti, R., Tygar, J., and B.
+ Briscoe, "Timed Efficient Stream Loss-Tolerant
+ Authentication (TESLA): Multicast Source Authentication
+ Transform Introduction", RFC 4082, June 2005.
+
+ [RFC4251] Ylonen, T. and C. Lonvick, Ed., "The Secure Shell (SSH)
+ Protocol Architecture", RFC 4251, January 2006.
+
+ [RFC4259] Montpetit, M.-J., Fairhurst, G., Clausen, H., Collini-
+ Nocker, B., and H. Linder, "A Framework for Transmission
+ of IP Datagrams over MPEG-2 Networks", RFC 4259, November
+ 2005.
+
+ [RFC4301] Kent, S. and K. Seo, "Security Architecture for the
+ Internet Protocol", RFC 4301, December 2005.
+
+ [RFC4535] Harney, H., Meth, U., Colegrove, A., and G. Gross,
+ "GSAKMP: Group Secure Association Key Management
+ Protocol", RFC 4535, June 2006.
+
+ [RFC4947] Fairhurst, G. and M. Montpetit, "Address Resolution
+ Mechanisms for IP Datagrams over MPEG-2 Networks", RFC
+ 4947, July 2007.
+
+ [RFC5163] Fairhurst, G. and B. Collini-Nocker, "Extension Formats
+ for Unidirectional Lightweight Encapsulation (ULE) and
+ the Generic Stream Encapsulation (GSE)", RFC 5163, April
+ 2008.
+
+ [RFC5246] Dierks, T. and E. Rescorla, "The Transport Layer Security
+ (TLS) Protocol Version 1.2", RFC 5246, August 2008.
+
+ [RFC5374] Weis, B., Gross, G., and D. Ignjatic, "Multicast
+ Extensions to the Security Architecture for the Internet
+ Protocol", RFC 5374, November 2008.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 18]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+Appendix A. ULE Security Framework
+
+ This section describes a security framework for the deployment of
+ secure ULE networks.
+
+A.1. Building Blocks
+
+ This ULE Security framework describes the following building blocks
+ as shown in Figure 2 below:
+
+ o The Key Management Block
+
+ o The ULE Security Extension Header Block
+
+ o The ULE Databases Block
+
+ Within the Key Management Block, the communication between the Group
+ Member entity and the Group Server entity happens in the control
+ plane. The ULE Security Header Block applies security to the ULE
+ SNDU and this happens in the ULE data plane. The ULE Security
+ Databases Block acts as the interface between the Key Management
+ Block (control plane) and the ULE Security Header Block (ULE data
+ plane) as shown in Figure 2. The Security Databases Block exists in
+ both the group member and server sides. However, it has been omitted
+ from Figure 2 just for clarity.
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 19]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ -----
+ +------+----------+ +----------------+ / \
+ | Key Management |/---------\| Key Management | |
+ | Group Member |\---------/| Group Server | |
+ | Block | | Block | Control
+ +------+----------+ +----------------+ Plane
+ | | |
+ | | |
+ | | \ /
+ ----------- Key management <-> ULE Security databases -----
+ | |
+ \ /
+ +------+----------+
+ | ULE |
+ | SAD / SPD |
+ | Databases |
+ | Block |
+ +------+-+--------+
+ / \
+ | |
+ ----------- ULE Security databases <-> ULE Security Header ----
+ | | / \
+ | | |
+ | | |
+ +------+-+--------+ ULE Data
+ | ULE Security | Plane
+ | Extension Header| |
+ | Block | |
+ +-----------------+ \ /
+ -----
+
+ Figure 2: Secure ULE Framework Building Blocks
+
+A.1.1. Key Management Block
+
+ A key management framework is required to provide security at the ULE
+ level using extension headers. This key management framework is
+ responsible for user authentication, access control, and Security
+ Association negotiation (which include the negotiations of the
+ security algorithms to be used and the generation of the different
+ session keys as well as policy material). The key management
+ framework can be either automated or manual. Hence, this key
+ management client entity (shown as the Key Management Group Member
+ Block in Figure 2) will be present in all ULE Receivers as well as at
+ the ULE Encapsulators. The ULE Encapsulator could also be the Key
+ Management Group Server Entity (shown as the Key Management Group
+ Server Block in Figure 2).
+
+
+
+
+Cruickshank, et al. Informational [Page 20]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ This happens when the ULE Encapsulator also acts as the Key
+ Management Group Server. Deployment may use either automated key
+ management protocols (e.g., GSAKMP [RFC4535]) or manual insertion of
+ keying material.
+
+A.1.2. ULE Security Databases Block
+
+ There needs to be two databases, i.e., similar to the IPsec
+ databases.
+
+ o ULE-SAD: ULE Security Association Database contains all the
+ Security Associations that are currently established with different
+ ULE peers.
+
+ o ULE-SPD: ULE Security Policy Database contains the policies as
+ described by the system manager. These policies describe the
+ security services that must be enforced.
+
+ While traditionally link-layer security has operated using simple
+ policy mechanisms, it is envisaged that ULE security should provide
+ flexibility comparable to IPsec. The above design is based on the
+ two databases defined for IPsec [RFC4301]. These databases could be
+ used to implement either simple policies (as in traditional link
+ security services) or more complex policies (as in IPsec).
+
+ The exact details of the header patterns that the SPD and SAD will
+ have to support for all use cases will be described in a separate
+ document. This document only highlights the need for such interfaces
+ between the ULE data plane and the Key Management control plane.
+
+A.1.3. ULE Extension Header Block
+
+ A new security extension header for the ULE protocol is required to
+ provide the security features of data confidentiality, identity
+ protection, data integrity, data authentication, and mechanisms to
+ prevent replay attacks. Security keying material will be used for
+ the different security algorithms (for encryption/decryption, MAC
+ generation, etc.), which are used to meet the security requirements,
+ described in detail in Section 4 of this document.
+
+ This block will use the keying material and policy information from
+ the ULE Security Database Block on the ULE payload to generate the
+ secure ULE Extension Header or to decipher the secure ULE extension
+ header to get the ULE payload. An example overview of the ULE
+ Security extension header format along with the ULE header and
+ payload is shown in Figure 3 below.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 21]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ +-------+------+-------------------------------+------+
+ | ULE |SEC | Protocol Data Unit | |
+ |Header |Header| |CRC-32|
+ +-------+------+-------------------------------+------+
+
+ Figure 3: ULE Security Extension Header Placement
+
+A.2. Interface Definition
+
+ Two new interfaces have to be defined between the blocks as shown in
+ Figure 2 above. These interfaces are:
+
+ o Key Management Block <-> ULE Security Databases Block
+
+ o ULE Security Databases Block <-> ULE Security Header Block
+
+ While the first interface is used by the Key Management Block to
+ insert keys, security associations, and policies into the ULE
+ Database Block, the second interface is used by the ULE Security
+ Extension Header Block to get the keys and policy material for
+ generation of the security extension header.
+
+A.2.1. Key Management <-> ULE Security Databases
+
+ This interface is between the Key Management Block of a group member
+ (GM client) and the ULE Security Database Block (shown in Figure 2).
+ The Key Management GM entity will communicate with the GCKS and then
+ get the relevant security information (keys, cipher mode, security
+ service, ULE_Security_ID, and other relevant keying material as well
+ as policy) and insert this data into the ULE Security Database Block.
+ The Key Management could be either automated (e.g., GSAKMP [RFC4535]
+ or GDOI [RFC3547]), or security information could be manually
+ inserted using this interface.
+
+ Examples of interface functions are:
+
+ o Insert_record_database (char * Database, char * record, char *
+ Unique_ID);
+
+ o Update_record_database (char * Database, char * record, char *
+ Unique_ID);
+
+ o Delete_record_database (char * Database, char * Unique_ID);
+
+ The definitions of the variables are as follows:
+
+ o Database - This is a pointer to the ULE Security databases
+
+
+
+
+Cruickshank, et al. Informational [Page 22]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ o record - This is the rows of security attributes to be entered or
+ modified in the above databases
+
+ o Unique_ID - This is the primary key to look up records (rows of
+ security attributes) in the above databases
+
+A.2.2. ULE Security Databases <-> ULE Security Header
+
+ This interface is between the ULE Security Database and the ULE
+ Security Extension Header Block as shown in Figure 2. When sending
+ traffic, the ULE encapsulator uses the Destination Address, the PID,
+ and possibly other information such as L3 source and destination
+ addresses to locate the relevant security record within the ULE
+ Security Database. It then uses the data in the record to create the
+ ULE security extension header. For received traffic, the ULE
+ decapsulator on receiving the ULE SNDU will use the Destination
+ Address, the PID, and a ULE Security ID inserted by the ULE
+ encapsulator into the security extension to retrieve the relevant
+ record from the Security Database. It then uses this information to
+ decrypt the ULE extension header. For both cases (either send or
+ receive traffic) only one interface is needed since the main
+ difference between the sender and receiver is the direction of the
+ flow of traffic. An example of such an interface is as follows:
+
+ o Get_record_database (char * Database, char * record, char *
+ Unique_ID);
+
+Appendix B. Motivation for ULE Link-Layer Security
+
+ Examination of the threat analysis and security requirements in
+ Sections 3 and 4 has shown that there is a need to provide security
+ in MPEG-2 transmission networks employing ULE. This section compares
+ the placement of security functionalities in different layers.
+
+B.1. Security at the IP Layer (Using IPsec)
+
+ The security architecture for the Internet Protocol [RFC4301]
+ describes security services for traffic at the IP layer. This
+ architecture primarily defines services for the Internet Protocol
+ (IP) unicast packets, as well as manually configured IP multicast
+ packets.
+
+ It is possible to use IPsec to secure ULE Streams. The major
+ advantage of IPsec is its wide implementation in IP routers and
+ hosts. IPsec in transport mode can be used for end-to-end security
+ transparently over MPEG-2 transmission links with little impact.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 23]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ In the context of MPEG-2 transmission links, if IPsec is used to
+ secure a ULE Stream, then the ULE Encapsulator and Receivers are
+ equivalent to the security gateways in IPsec terminology. A security
+ gateway implementation of IPsec uses tunnel mode. Such usage has the
+ following disadvantages:
+
+ o There is an extra transmission overhead associated with using IPsec
+ in tunnel mode, i.e., the extra IP header (IPv4 or IPv6).
+
+ o There is a need to protect the identity (NPA address) of ULE
+ Receivers over the ULE broadcast medium; IPsec is not suitable for
+ providing this service. In addition, the interfaces of these
+ devices do not necessarily have IP addresses (they can be L2
+ devices).
+
+ o Multicast is considered a major service over ULE links. The
+ current IPsec specifications [RFC4301] only define a pairwise
+ tunnel between two IPsec devices with manual keying. Work is in
+ progress in defining the extra detail needed for multicast and to
+ use the tunnel mode with address preservation to allow efficient
+ multicasting. For further details refer to [RFC5374].
+
+B.2. Link Security below the Encapsulation Layer
+
+ Link layer security can be provided at the MPEG-2 TS layer (below
+ ULE). MPEG-2 TS encryption encrypts all TS Packets sent with a
+ specific PID value. However, an MPEG-2 TS may typically multiplex
+ several IP flows, belonging to different users, using a common PID.
+ Therefore, all multiplexed traffic will share the same security keys.
+
+ This has the following advantages:
+
+ o The bit stream sent on the broadcast network does not expose any L2
+ or L3 headers, specifically all addresses, type fields, and length
+ fields are encrypted prior to transmission.
+
+ o This method does not preclude the use of IPsec, TLS, or any other
+ form of higher-layer security.
+
+ However it has the following disadvantages:
+
+ o When a PID is shared between several users, each ULE Receiver needs
+ to decrypt all MPEG-2 TS Packets with a matching PID, possibly
+ including those that are not required to be forwarded. Therefore,
+ it does not have the flexibility to separately secure individual IP
+ flows.
+
+
+
+
+
+Cruickshank, et al. Informational [Page 24]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ o When a PID is shared between several users, the ULE Receivers will
+ have access to private traffic destined to other ULE Receivers,
+ since they share a common PID and key.
+
+ o IETF-based key management that is very flexible and secure is not
+ used in existing MPEG-2 based systems. Existing access control
+ mechanisms in such systems have limited flexibility in terms of
+ controlling the use of keying and rekeying. Therefore, if the key
+ is compromised, this will impact several ULE Receivers.
+
+ Currently, there are few deployed L2 security systems for MPEG-2
+ transmission networks. Conditional access for digital TV
+ broadcasting is one example. However, this approach is optimised for
+ TV services and is not well-suited to IP packet transmission. Some
+ other systems are specified in standards such as MPE [ETSI-DAT], but
+ there are currently no known implementations and these methods are
+ not applicable to GSE.
+
+B.3. Link Security as a Part of the Encapsulation Layer
+
+ Examining the threat analysis in Section 3 has shown that protection
+ of ULE Stream from eavesdropping and ULE Receiver identity are major
+ requirements.
+
+ There are several advantages in using ULE link-layer security:
+
+ o The protection of the complete ULE Protocol Data Unit (PDU)
+ including IP addresses. The protection can be applied either per
+ IP flow or per Receiver NPA address.
+
+ o Ability to protect the identity of the Receiver within the MPEG-2
+ transmission network at the IP layer and also at L2.
+
+ o Efficient protection of IP multicast over ULE links.
+
+ o Transparency to the use of Network Address Translation (NATs)
+ [RFC3715] and TCP Performance Enhancing Proxies (PEP) [RFC3135],
+ which require the ability to inspect and modify the packets sent
+ over the ULE link.
+
+ This method does not preclude the use of IPsec at L3 (or TLS
+ [RFC5246] at L4). IPsec and TLS provide strong authentication of the
+ endpoints in the communication.
+
+
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 25]
+
+RFC 5458 Security Requirements for ULE March 2009
+
+
+ L3 end-to-end security would partially deny the advantage listed
+ above (use of PEP, compression, etc.), since those techniques could
+ only be applied to TCP packets bearing a TCP-encapsulated IPsec
+ packet exchange, but not the TCP packets of the original
+ applications, which in particular inhibits compression.
+
+ End-to-end security (IPsec, TLS, etc.) may be used independently to
+ provide strong authentication of the endpoints in the communication.
+ This authentication is desirable in many scenarios to ensure that the
+ correct information is being exchanged between the trusted parties,
+ whereas Layer 2 methods cannot provide this guarantee.
+
+Authors' Addresses
+
+ Haitham Cruickshank
+ Centre for Communications System Research (CCSR)
+ University of Surrey
+ Guildford, Surrey, GU2 7XH
+ UK
+ EMail: h.cruickshank@surrey.ac.uk
+
+ Prashant Pillai
+ Mobile and Satellite Communications Research Centre (MSCRC)
+ School of Engineering, Design and Technology
+ University of Bradford
+ Richmond Road, Bradford BD7 1DP
+ UK
+ EMail: p.pillai@bradford.ac.uk
+
+ Michael Noisternig
+ Multimedia Comm. Group, Dpt. of Computer Sciences
+ University of Salzburg
+ Jakob-Haringer-Str. 2
+ 5020 Salzburg
+ Austria
+ EMail: mnoist@cosy.sbg.ac.at
+
+ Sunil Iyengar
+ Space & Defence
+ Logica
+ Springfield Drive
+ Leatherhead
+ Surrey KT22 7LP
+ UK
+ EMail: sunil.iyengar@logica.com
+
+
+
+
+
+
+Cruickshank, et al. Informational [Page 26]
+