ImageVerifierCode 换一换
格式:PDF , 页数:46 ,大小:1.57MB ,
资源ID:805289      下载积分:10000 积分
快捷下载
登录下载
邮箱/手机:
温馨提示:
快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。 如填写123,账号就是123,密码也是123。
特别说明:
请自助下载,系统不会自动发送文件的哦; 如果您已付费,想二次下载,请登录后访问:我的下载记录
支付方式: 支付宝扫码支付 微信扫码支付   
验证码:   换一换

加入VIP,免费下载
 

温馨提示:由于个人手机设置不同,如果发现不能下载,请复制以下地址【http://www.mydoc123.com/d-805289.html】到电脑端继续下载(重复下载不扣费)。

已注册用户请登录:
账号:
密码:
验证码:   换一换
  忘记密码?
三方登录: 微信登录  

下载须知

1: 本站所有资源如无特殊说明,都需要本地电脑安装OFFICE2007和PDF阅读器。
2: 试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。
3: 文件的所有权益归上传用户所有。
4. 未经权益所有人同意不得将文件中的内容挪作商业或盈利用途。
5. 本站仅提供交流平台,并不能对任何下载内容负责。
6. 下载文件中如有侵权或不适当内容,请与我们联系,我们立即纠正。
7. 本站不保证下载资源的准确性、安全性和完整性, 同时也不承担用户因使用这些下载资源对自己和他人造成任何形式的伤害或损失。

版权提示 | 免责声明

本文(ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf)为本站会员(progressking105)主动上传,麦多课文库仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文库(发送邮件至master@mydoc123.com或直接QQ联系客服),我们立即给予删除!

ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf

1、 International Telecommunication Union ITU-T X.603.1TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 1(11/2009) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Networking Information technology Relayed multicast protocol: Specification for

2、simplex group applications Amendment 1: Security extensions Recommendation ITU-T X.603.1 (2007) Amendment 1 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS Services and facilities X.1X.19 Interfaces X.20X.49 Transmission, signalling and swit

3、ching X.50X.89 Network aspects X.90X.149 Maintenance X.150X.179 Administrative arrangements X.180X.199 OPEN SYSTEMS INTERCONNECTION Model and notation X.200X.209 Service definitions X.210X.219 Connection-mode protocol specifications X.220X.229 Connectionless-mode protocol specifications X.230X.239 P

4、ICS proformas X.240X.259 Protocol Identification X.260X.269 Security Protocols X.270X.279 Layer Managed Objects X.280X.289 Conformance testing X.290X.299 INTERWORKING BETWEEN NETWORKS General X.300X.349 Satellite data transmission systems X.350X.369 IP-based networks X.370X.379 MESSAGE HANDLING SYST

5、EMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS Networking X.600X.629Efficiency X.630X.639 Quality of service X.640X.649 Naming, Addressing and Registration X.650X.679 Abstract Syntax Notation One (ASN.1) X.680X.699 OSI MANAGEMENT Systems Management framework and architecture X

6、.700X.709 Management Communication Service and Protocol X.710X.719 Structure of Management Information X.720X.729 Management functions and ODMA functions X.730X.799 SECURITY X.800X.849 OSI APPLICATIONS Commitment, Concurrency and Recovery X.850X.859 Transaction processing X.860X.879 Remote operation

7、s X.880X.889 Generic applications of ASN.1 X.890X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY X.1000X.1099 SECURE APPLICATIONS AND SERVICES X.1100X.1199 CYBERSPACE SECURITY X.1200X.1299 SECURE APPLICATIONS AND SERVICES X.1300X.1399 For further details, please refer to

8、 the list of ITU-T Recommendations. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) i INTERNATIONAL STANDARD ISO/IEC 16512-2 RECOMMENDATION ITU-T X.603.1 Information technology Relayed multicast protocol: Specification for simplex group applications Amendment 1 Security extensions Summary Amendment 1 to R

9、ecommendation ITU-T X.603.1 | ISO/IEC 16512-2 describes the security functionalities of an application-level relayed multicast protocol for one-to-many group applications. The protocol provides various security facilities to fulfil general as well as specific security requirements. Some detailed fun

10、ctions that can operate with a variety of standardized security mechanisms are provided. This amendment enforces the existing RMCP protocol security. History Edition Recommendation Approval Study Group 1.0 ITU-T X.603.1 2007-02-13 17 1.1 ITU-T X.603.1 (2007) Amend.1 2009-11-13 11 1.2 ITU-T X.603.1 (

11、2007) Amend. 2 2010-03-01 11 ii Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization

12、 Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets

13、every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts pur

14、view, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is vol

15、untary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and t

16、he negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involv

17、e the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recomm

18、endation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at

19、http:/www.itu.int/ITU-T/ipr/. ITU 2010 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) iii CONTENTS Page 1) Clause 1, Scope 1 2) Clause 2, Normative references 1 3) Cla

20、use 3, Definitions 2 4) Clause 4, Abbreviations 2 5) New clauses 9-12 3 6) New Annex E . 36 7) New Annex F . 38 ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 1 INTERNATIONAL STANDARD RECOMMENDATION ITU-T Information technology Relayed multicast protocol: Specification

21、 for simplex group applications Amendment 1 Security extensions 1) Clause 1, Scope Delete the existing text and replace it with the following: This Recommendation | International Standard specifies the Relayed MultiCast Protocol for simplex group applications (RMCP-2), an application-layer protocol,

22、 which constructs a multicast tree for data delivery from one sender to multiple receivers over the Internet where IP multicast is not fully deployed. Clauses 5-8 define a basic RMCP-2 protocol without security features, and clauses 9-12 define a secure RMCP-2 protocol that adds security features to

23、 the basic protocol. Both protocols specify a series of functions and procedures for multicast agents to construct a one-to-many relayed data path and to relay simplex data. They also specify the operations of the session manager to manage multicast sessions. These protocols can be used for applicat

24、ions that require one-to-many data delivery services, such as multimedia streaming services or file dissemination services. Annex E defines a membership authentication procedure for use with the secure RMCP-2 protocol. Annexes A-D provide informative material related to these protocols. Annex F cont

25、ains an informative bibliography. 2) Clause 2, Normative references Following the first paragraph, re-order the existing references and add new subheadings as follows: 2.1 Identical Recommendations | International Standards Recommendation ITU-T X.603 (2004) | ISO/IEC 16512-1:2005, Information techno

26、logy Relayed multicast protocol: Framework. 2.2 Additional references ISO/IEC 9797-2:2002, Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function. ISO/IEC 9798-3:1998, Information technology Security techniques Entity authent

27、ication Part 3: Mechanisms using digital signature techniques. ISO/IEC 18033-2:2006, Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers. ISO/IEC 18033-3:2005, Information technology Security techniques Encryption algorithms Part 3: Block ciphers. ISO/IEC 1803

28、3-4:2005, Information technology Security techniques Encryption algorithms Part 4: Stream ciphers. IETF RFC 2094 (1997), Group Key Management Protocol (GKMP) Architecture. IETF RFC 3546 (2003), Transport Layer Security (TLS) Extensions. IETF RFC 3830 (2004), MIKEY: Multimedia Internet KEYing. IETF R

29、FC 4279 (2005), Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). IETF RFC 4346 (2006), The Transport Layer Security (TLS) Protocol Version 1.1. IETF RFC 4535 (2006), GSAKMP: Group Secure Association Key Management Protocol. ISO/IEC 16512-2:2008/Amd.1:2010 (E) 2 Rec. ITU-T X.603.1 (200

30、7)/Amd.1 (11/2009) 3) Clause 3, Definitions Add the following definitions to clause 3: 3.13 RMCP-2 protocol: A relayed multicast protocol for simplex group applications. NOTE When used in clauses 5-8, this term has the same meaning as basic RMCP-2. It is expected that this term will be withdrawn and

31、 replaced by basic RMCP-2 protocol in future revisions of this Recommendation | International Standard. 3.14 basic RMCP-2 protocol: The relayed multicast protocol for simplex group application defined in clauses 5-8. 3.15 secure RMCP-2 protocol: The relayed multicast protocol supporting security fea

32、tures for simplex group applications defined in clauses 9-12. 3.16 dedicated multicast agent (DMA): An intermediate MA pre-deployed as a trust server by the Session Manager (SM) in an RMCP session. 3.17 security policy: The set of criteria for the provision of security services, together with the se

33、t of values for these criteria, resulting from agreement of the security mechanisms defined in 10.1.4. 3.18 TLS_CERT mode: A mode of the TLS defined in IETF RFC 4346 for the authentication of MAs using a certificate. 3.19 TLS_PSK mode: A mode of the TLS defined in IETF RFC 4279 for the authenticatio

34、n of MAs using a pre-shared key for the TLS key exchange. 3.20 relayed multicast region; RM region: A management zone defined by the use of the session key Ks. 3.21 member multicast region; MM region: A management zone defined by the use of one or more group keys Kg. 3.22 member multicast group; MM

35、group: 1) (in a multicast disabled area) a group consisting of one DMA and multiple RMAs sharing the same group key Kg. 2) (in a multicast enabled area) a group consisting of one HMA, multiple RMAs together with one or more candidate HMAs sharing the same group key Kg. 3.23 candidate HMA: A DMA that

36、 is able to assume the role of an HMA, should the original HMA leave or be terminated from a multicast-enabled MM group. 3.24 group attribute (GP_ATTRIBUTE): An attribute that defines whether or not the Content Provider controls the admission of RMAs to the secure RMCP-2 session. 3.25 closed group:

37、An MM group in which all the RMAs have been allocated a service user identifier from the Content Provider before subscribing to the secure RMCP-2 session. 3.26 open group: An MM group in which none of the RMAs require a service user identifier before subscribing to the secure RMCP-2 session. 4) Clau

38、se 4, Abbreviations Add the following abbreviations to clause 4: ACL Access Control List AUTH Authentication CEK Contents Encryption Key CP Content Provider HRSREQ Head Required Security Request HRSANS Head Required Security Answer KEYDELIVER Key Delivery SECAGREQ SECurity AGreement REQuest SECAGANS

39、 SECurity AGreement ANSwer SECALGREQ SECurity ALgorithms REQuest SECLIST Selected sECurity LIST TLS Transport Layer Security ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 3 5) New clauses 9-12 Add the following new clauses: 9 Overview of secure RMCP-2 9.1 Conventions

40、9.1.1 Use of basic RMCP-2 protocol The term basic RMCP-2 protocol, when used in clauses 9-12, refers to the protocol defined in clauses 5-8. 9.1.2 Hexadecimal notation Code values for message parameters in clause 11 (Format of secure RMCP-2 messages) and clause 12 (Parameters) are expressed in hexad

41、ecimal notation, e.g., 0x14 for 20 in decimal notation. 9.2 Secure RMCP-2 entities 9.2.1 Introduction The secure RMCP-2 protocol supports security functions of the RMCP-2 used for relayed multicast data transport through unicast communication over the Internet. The secure RMCP-2 protocol components

42、correspond to those described in the basic RMCP-2 protocol except that a new type of MA, a dedicated multicast agent (DMA), has been introduced. A dedicated multicast agent is an intermediate MA pre-deployed as a trust server by the SM. For secure communication, each session consists of an SM, an SM

43、A, DMAs, RMAs, together with a single sending application and multiple receiving applications. Their topology, as shown in Figure 85, corresponds with that in the basic RMCP-2 protocol (see 5.1). X.603.1(07)Amd.1(09)_F85SMAReceivingApp.SMReceivingApp.ReceivingApp.SendingApp.RMADMARMA RMAFigure 85 RM

44、CP-2 service topology with security ISO/IEC 16512-2:2008/Amd.1:2010 (E) 4 Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 9.2.2 Session manager The SM is responsible for maintaining session security, which includes the management of service membership, the management of key and ACL for DMA and RMA, and me

45、ssage encryption/decryption together with the SM functions of basic RMCP-2. Figure 86 shows an abstract protocol stack for the operation of SM functions. The SM has TLS and multicast session security modules for the provision of security. TLS is used for the initial authentication of DMAs and RMAs w

46、hen they join the session. The Multicast session security module performs the following security functions after the completion of TLS authentication: a) Security policy; b) Session admission management; c) Session key management; d) Access Control list management; e) Secure group and membership man

47、agement; f) Message encryption/decryption. Figure 86 Internal structure of the SM 9.2.3 Dedicated multicast agents DMAs are in charge of the secure establishment and maintenance of the RMCP-2 tree, support of membership authentication and data confidentiality. Figure 87 shows the internal structure

48、of the DMAs with modules for Key/Message Security Management and Group/Member Security Management. These modules support the following security functions: Key/Message Security Management Module a) Group key management; b) Message encryption/decryption; c) Contents encryption key management. Group/Me

49、mber Security Management Module a) Secure tree configuration; b) Session key management; c) Secure group and membership management. ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 5 Figure 87 Internal structure of DMAs 9.2.4 Sender and receiver multicast agents The internal structure of the SMA and the RMAs is shown in Figure 88. The structure is the same as for DMAs except that the Group Security Management Module is not included.

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1