ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf

上传人:progressking105 文档编号:805289 上传时间:2019-02-04 格式:PDF 页数:46 大小:1.57MB
下载 相关 举报
ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf_第1页
第1页 / 共46页
ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf_第2页
第2页 / 共46页
ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf_第3页
第3页 / 共46页
ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf_第4页
第4页 / 共46页
ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf_第5页
第5页 / 共46页
点击查看更多>>
资源描述

1、 International Telecommunication Union ITU-T X.603.1TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 1(11/2009) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Networking Information technology Relayed multicast protocol: Specification for

2、simplex group applications Amendment 1: Security extensions Recommendation ITU-T X.603.1 (2007) Amendment 1 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS Services and facilities X.1X.19 Interfaces X.20X.49 Transmission, signalling and swit

3、ching X.50X.89 Network aspects X.90X.149 Maintenance X.150X.179 Administrative arrangements X.180X.199 OPEN SYSTEMS INTERCONNECTION Model and notation X.200X.209 Service definitions X.210X.219 Connection-mode protocol specifications X.220X.229 Connectionless-mode protocol specifications X.230X.239 P

4、ICS proformas X.240X.259 Protocol Identification X.260X.269 Security Protocols X.270X.279 Layer Managed Objects X.280X.289 Conformance testing X.290X.299 INTERWORKING BETWEEN NETWORKS General X.300X.349 Satellite data transmission systems X.350X.369 IP-based networks X.370X.379 MESSAGE HANDLING SYST

5、EMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS Networking X.600X.629Efficiency X.630X.639 Quality of service X.640X.649 Naming, Addressing and Registration X.650X.679 Abstract Syntax Notation One (ASN.1) X.680X.699 OSI MANAGEMENT Systems Management framework and architecture X

6、.700X.709 Management Communication Service and Protocol X.710X.719 Structure of Management Information X.720X.729 Management functions and ODMA functions X.730X.799 SECURITY X.800X.849 OSI APPLICATIONS Commitment, Concurrency and Recovery X.850X.859 Transaction processing X.860X.879 Remote operation

7、s X.880X.889 Generic applications of ASN.1 X.890X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY X.1000X.1099 SECURE APPLICATIONS AND SERVICES X.1100X.1199 CYBERSPACE SECURITY X.1200X.1299 SECURE APPLICATIONS AND SERVICES X.1300X.1399 For further details, please refer to

8、 the list of ITU-T Recommendations. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) i INTERNATIONAL STANDARD ISO/IEC 16512-2 RECOMMENDATION ITU-T X.603.1 Information technology Relayed multicast protocol: Specification for simplex group applications Amendment 1 Security extensions Summary Amendment 1 to R

9、ecommendation ITU-T X.603.1 | ISO/IEC 16512-2 describes the security functionalities of an application-level relayed multicast protocol for one-to-many group applications. The protocol provides various security facilities to fulfil general as well as specific security requirements. Some detailed fun

10、ctions that can operate with a variety of standardized security mechanisms are provided. This amendment enforces the existing RMCP protocol security. History Edition Recommendation Approval Study Group 1.0 ITU-T X.603.1 2007-02-13 17 1.1 ITU-T X.603.1 (2007) Amend.1 2009-11-13 11 1.2 ITU-T X.603.1 (

11、2007) Amend. 2 2010-03-01 11 ii Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization

12、 Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets

13、every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts pur

14、view, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is vol

15、untary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and t

16、he negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involv

17、e the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recomm

18、endation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at

19、http:/www.itu.int/ITU-T/ipr/. ITU 2010 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) iii CONTENTS Page 1) Clause 1, Scope 1 2) Clause 2, Normative references 1 3) Cla

20、use 3, Definitions 2 4) Clause 4, Abbreviations 2 5) New clauses 9-12 3 6) New Annex E . 36 7) New Annex F . 38 ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 1 INTERNATIONAL STANDARD RECOMMENDATION ITU-T Information technology Relayed multicast protocol: Specification

21、 for simplex group applications Amendment 1 Security extensions 1) Clause 1, Scope Delete the existing text and replace it with the following: This Recommendation | International Standard specifies the Relayed MultiCast Protocol for simplex group applications (RMCP-2), an application-layer protocol,

22、 which constructs a multicast tree for data delivery from one sender to multiple receivers over the Internet where IP multicast is not fully deployed. Clauses 5-8 define a basic RMCP-2 protocol without security features, and clauses 9-12 define a secure RMCP-2 protocol that adds security features to

23、 the basic protocol. Both protocols specify a series of functions and procedures for multicast agents to construct a one-to-many relayed data path and to relay simplex data. They also specify the operations of the session manager to manage multicast sessions. These protocols can be used for applicat

24、ions that require one-to-many data delivery services, such as multimedia streaming services or file dissemination services. Annex E defines a membership authentication procedure for use with the secure RMCP-2 protocol. Annexes A-D provide informative material related to these protocols. Annex F cont

25、ains an informative bibliography. 2) Clause 2, Normative references Following the first paragraph, re-order the existing references and add new subheadings as follows: 2.1 Identical Recommendations | International Standards Recommendation ITU-T X.603 (2004) | ISO/IEC 16512-1:2005, Information techno

26、logy Relayed multicast protocol: Framework. 2.2 Additional references ISO/IEC 9797-2:2002, Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function. ISO/IEC 9798-3:1998, Information technology Security techniques Entity authent

27、ication Part 3: Mechanisms using digital signature techniques. ISO/IEC 18033-2:2006, Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers. ISO/IEC 18033-3:2005, Information technology Security techniques Encryption algorithms Part 3: Block ciphers. ISO/IEC 1803

28、3-4:2005, Information technology Security techniques Encryption algorithms Part 4: Stream ciphers. IETF RFC 2094 (1997), Group Key Management Protocol (GKMP) Architecture. IETF RFC 3546 (2003), Transport Layer Security (TLS) Extensions. IETF RFC 3830 (2004), MIKEY: Multimedia Internet KEYing. IETF R

29、FC 4279 (2005), Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). IETF RFC 4346 (2006), The Transport Layer Security (TLS) Protocol Version 1.1. IETF RFC 4535 (2006), GSAKMP: Group Secure Association Key Management Protocol. ISO/IEC 16512-2:2008/Amd.1:2010 (E) 2 Rec. ITU-T X.603.1 (200

30、7)/Amd.1 (11/2009) 3) Clause 3, Definitions Add the following definitions to clause 3: 3.13 RMCP-2 protocol: A relayed multicast protocol for simplex group applications. NOTE When used in clauses 5-8, this term has the same meaning as basic RMCP-2. It is expected that this term will be withdrawn and

31、 replaced by basic RMCP-2 protocol in future revisions of this Recommendation | International Standard. 3.14 basic RMCP-2 protocol: The relayed multicast protocol for simplex group application defined in clauses 5-8. 3.15 secure RMCP-2 protocol: The relayed multicast protocol supporting security fea

32、tures for simplex group applications defined in clauses 9-12. 3.16 dedicated multicast agent (DMA): An intermediate MA pre-deployed as a trust server by the Session Manager (SM) in an RMCP session. 3.17 security policy: The set of criteria for the provision of security services, together with the se

33、t of values for these criteria, resulting from agreement of the security mechanisms defined in 10.1.4. 3.18 TLS_CERT mode: A mode of the TLS defined in IETF RFC 4346 for the authentication of MAs using a certificate. 3.19 TLS_PSK mode: A mode of the TLS defined in IETF RFC 4279 for the authenticatio

34、n of MAs using a pre-shared key for the TLS key exchange. 3.20 relayed multicast region; RM region: A management zone defined by the use of the session key Ks. 3.21 member multicast region; MM region: A management zone defined by the use of one or more group keys Kg. 3.22 member multicast group; MM

35、group: 1) (in a multicast disabled area) a group consisting of one DMA and multiple RMAs sharing the same group key Kg. 2) (in a multicast enabled area) a group consisting of one HMA, multiple RMAs together with one or more candidate HMAs sharing the same group key Kg. 3.23 candidate HMA: A DMA that

36、 is able to assume the role of an HMA, should the original HMA leave or be terminated from a multicast-enabled MM group. 3.24 group attribute (GP_ATTRIBUTE): An attribute that defines whether or not the Content Provider controls the admission of RMAs to the secure RMCP-2 session. 3.25 closed group:

37、An MM group in which all the RMAs have been allocated a service user identifier from the Content Provider before subscribing to the secure RMCP-2 session. 3.26 open group: An MM group in which none of the RMAs require a service user identifier before subscribing to the secure RMCP-2 session. 4) Clau

38、se 4, Abbreviations Add the following abbreviations to clause 4: ACL Access Control List AUTH Authentication CEK Contents Encryption Key CP Content Provider HRSREQ Head Required Security Request HRSANS Head Required Security Answer KEYDELIVER Key Delivery SECAGREQ SECurity AGreement REQuest SECAGANS

39、 SECurity AGreement ANSwer SECALGREQ SECurity ALgorithms REQuest SECLIST Selected sECurity LIST TLS Transport Layer Security ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 3 5) New clauses 9-12 Add the following new clauses: 9 Overview of secure RMCP-2 9.1 Conventions

40、9.1.1 Use of basic RMCP-2 protocol The term basic RMCP-2 protocol, when used in clauses 9-12, refers to the protocol defined in clauses 5-8. 9.1.2 Hexadecimal notation Code values for message parameters in clause 11 (Format of secure RMCP-2 messages) and clause 12 (Parameters) are expressed in hexad

41、ecimal notation, e.g., 0x14 for 20 in decimal notation. 9.2 Secure RMCP-2 entities 9.2.1 Introduction The secure RMCP-2 protocol supports security functions of the RMCP-2 used for relayed multicast data transport through unicast communication over the Internet. The secure RMCP-2 protocol components

42、correspond to those described in the basic RMCP-2 protocol except that a new type of MA, a dedicated multicast agent (DMA), has been introduced. A dedicated multicast agent is an intermediate MA pre-deployed as a trust server by the SM. For secure communication, each session consists of an SM, an SM

43、A, DMAs, RMAs, together with a single sending application and multiple receiving applications. Their topology, as shown in Figure 85, corresponds with that in the basic RMCP-2 protocol (see 5.1). X.603.1(07)Amd.1(09)_F85SMAReceivingApp.SMReceivingApp.ReceivingApp.SendingApp.RMADMARMA RMAFigure 85 RM

44、CP-2 service topology with security ISO/IEC 16512-2:2008/Amd.1:2010 (E) 4 Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 9.2.2 Session manager The SM is responsible for maintaining session security, which includes the management of service membership, the management of key and ACL for DMA and RMA, and me

45、ssage encryption/decryption together with the SM functions of basic RMCP-2. Figure 86 shows an abstract protocol stack for the operation of SM functions. The SM has TLS and multicast session security modules for the provision of security. TLS is used for the initial authentication of DMAs and RMAs w

46、hen they join the session. The Multicast session security module performs the following security functions after the completion of TLS authentication: a) Security policy; b) Session admission management; c) Session key management; d) Access Control list management; e) Secure group and membership man

47、agement; f) Message encryption/decryption. Figure 86 Internal structure of the SM 9.2.3 Dedicated multicast agents DMAs are in charge of the secure establishment and maintenance of the RMCP-2 tree, support of membership authentication and data confidentiality. Figure 87 shows the internal structure

48、of the DMAs with modules for Key/Message Security Management and Group/Member Security Management. These modules support the following security functions: Key/Message Security Management Module a) Group key management; b) Message encryption/decryption; c) Contents encryption key management. Group/Me

49、mber Security Management Module a) Secure tree configuration; b) Session key management; c) Secure group and membership management. ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 5 Figure 87 Internal structure of DMAs 9.2.4 Sender and receiver multicast agents The internal structure of the SMA and the RMAs is shown in Figure 88. The structure is the same as for DMAs except that the Group Security Management Module is not included.

展开阅读全文
相关资源
猜你喜欢
相关搜索

当前位置:首页 > 标准规范 > 国际标准 > 其他

copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
备案/许可证编号:苏ICP备17064731号-1