欢迎来到麦多课文档分享! | 帮助中心 海量文档,免费浏览,给你所需,享你所想!
麦多课文档分享
全部分类
  • 标准规范>
  • 教学课件>
  • 考试资料>
  • 办公文档>
  • 学术论文>
  • 行业资料>
  • 易语言源码>
  • ImageVerifierCode 换一换
    首页 麦多课文档分享 > 资源分类 > PDF文档下载
    分享到微信 分享到微博 分享到QQ空间

    ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf

    • 资源ID:805289       资源大小:1.57MB        全文页数:46页
    • 资源格式: PDF        下载积分:10000积分
    快捷下载 游客一键下载
    账号登录下载
    微信登录下载
    二维码
    微信扫一扫登录
    下载资源需要10000积分(如需开发票,请勿充值!)
    邮箱/手机:
    温馨提示:
    如需开发票,请勿充值!快捷下载时,用户名和密码都是您填写的邮箱或者手机号,方便查询和重复下载(系统自动生成)。
    如需开发票,请勿充值!如填写123,账号就是123,密码也是123。
    支付方式: 支付宝扫码支付    微信扫码支付   
    验证码:   换一换

    加入VIP,交流精品资源
     
    账号:
    密码:
    验证码:   换一换
      忘记密码?
        
    友情提示
    2、PDF文件下载后,可能会被浏览器默认打开,此种情况可以点击浏览器菜单,保存网页到桌面,就可以正常下载了。
    3、本站不支持迅雷下载,请使用电脑自带的IE浏览器,或者360浏览器、谷歌浏览器下载即可。
    4、本站资源下载后的文档和图纸-无水印,预览文档经过压缩,下载后原文更清晰。
    5、试题试卷类文档,如果标题没有明确说明有答案则都视为没有答案,请知晓。

    ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf

    1、 International Telecommunication Union ITU-T X.603.1TELECOMMUNICATION STANDARDIZATION SECTOR OF ITU Amendment 1(11/2009) SERIES X: DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY OSI networking and system aspects Networking Information technology Relayed multicast protocol: Specification for

    2、simplex group applications Amendment 1: Security extensions Recommendation ITU-T X.603.1 (2007) Amendment 1 ITU-T X-SERIES RECOMMENDATIONS DATA NETWORKS, OPEN SYSTEM COMMUNICATIONS AND SECURITY PUBLIC DATA NETWORKS Services and facilities X.1X.19 Interfaces X.20X.49 Transmission, signalling and swit

    3、ching X.50X.89 Network aspects X.90X.149 Maintenance X.150X.179 Administrative arrangements X.180X.199 OPEN SYSTEMS INTERCONNECTION Model and notation X.200X.209 Service definitions X.210X.219 Connection-mode protocol specifications X.220X.229 Connectionless-mode protocol specifications X.230X.239 P

    4、ICS proformas X.240X.259 Protocol Identification X.260X.269 Security Protocols X.270X.279 Layer Managed Objects X.280X.289 Conformance testing X.290X.299 INTERWORKING BETWEEN NETWORKS General X.300X.349 Satellite data transmission systems X.350X.369 IP-based networks X.370X.379 MESSAGE HANDLING SYST

    5、EMS X.400X.499 DIRECTORY X.500X.599 OSI NETWORKING AND SYSTEM ASPECTS Networking X.600X.629Efficiency X.630X.639 Quality of service X.640X.649 Naming, Addressing and Registration X.650X.679 Abstract Syntax Notation One (ASN.1) X.680X.699 OSI MANAGEMENT Systems Management framework and architecture X

    6、.700X.709 Management Communication Service and Protocol X.710X.719 Structure of Management Information X.720X.729 Management functions and ODMA functions X.730X.799 SECURITY X.800X.849 OSI APPLICATIONS Commitment, Concurrency and Recovery X.850X.859 Transaction processing X.860X.879 Remote operation

    7、s X.880X.889 Generic applications of ASN.1 X.890X.899 OPEN DISTRIBUTED PROCESSING X.900X.999 INFORMATION AND NETWORK SECURITY X.1000X.1099 SECURE APPLICATIONS AND SERVICES X.1100X.1199 CYBERSPACE SECURITY X.1200X.1299 SECURE APPLICATIONS AND SERVICES X.1300X.1399 For further details, please refer to

    8、 the list of ITU-T Recommendations. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) i INTERNATIONAL STANDARD ISO/IEC 16512-2 RECOMMENDATION ITU-T X.603.1 Information technology Relayed multicast protocol: Specification for simplex group applications Amendment 1 Security extensions Summary Amendment 1 to R

    9、ecommendation ITU-T X.603.1 | ISO/IEC 16512-2 describes the security functionalities of an application-level relayed multicast protocol for one-to-many group applications. The protocol provides various security facilities to fulfil general as well as specific security requirements. Some detailed fun

    10、ctions that can operate with a variety of standardized security mechanisms are provided. This amendment enforces the existing RMCP protocol security. History Edition Recommendation Approval Study Group 1.0 ITU-T X.603.1 2007-02-13 17 1.1 ITU-T X.603.1 (2007) Amend.1 2009-11-13 11 1.2 ITU-T X.603.1 (

    11、2007) Amend. 2 2010-03-01 11 ii Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) FOREWORD The International Telecommunication Union (ITU) is the United Nations specialized agency in the field of telecommunications, information and communication technologies (ICTs). The ITU Telecommunication Standardization

    12、 Sector (ITU-T) is a permanent organ of ITU. ITU-T is responsible for studying technical, operating and tariff questions and issuing Recommendations on them with a view to standardizing telecommunications on a worldwide basis. The World Telecommunication Standardization Assembly (WTSA), which meets

    13、every four years, establishes the topics for study by the ITU-T study groups which, in turn, produce Recommendations on these topics. The approval of ITU-T Recommendations is covered by the procedure laid down in WTSA Resolution 1. In some areas of information technology which fall within ITU-Ts pur

    14、view, the necessary standards are prepared on a collaborative basis with ISO and IEC. NOTE In this Recommendation, the expression “Administration“ is used for conciseness to indicate both a telecommunication administration and a recognized operating agency. Compliance with this Recommendation is vol

    15、untary. However, the Recommendation may contain certain mandatory provisions (to ensure e.g., interoperability or applicability) and compliance with the Recommendation is achieved when all of these mandatory provisions are met. The words “shall“ or some other obligatory language such as “must“ and t

    16、he negative equivalents are used to express requirements. The use of such words does not suggest that compliance with the Recommendation is required of any party. INTELLECTUAL PROPERTY RIGHTS ITU draws attention to the possibility that the practice or implementation of this Recommendation may involv

    17、e the use of a claimed Intellectual Property Right. ITU takes no position concerning the evidence, validity or applicability of claimed Intellectual Property Rights, whether asserted by ITU members or others outside of the Recommendation development process. As of the date of approval of this Recomm

    18、endation, ITU had not received notice of intellectual property, protected by patents, which may be required to implement this Recommendation. However, implementers are cautioned that this may not represent the latest information and are therefore strongly urged to consult the TSB patent database at

    19、http:/www.itu.int/ITU-T/ipr/. ITU 2010 All rights reserved. No part of this publication may be reproduced, by any means whatsoever, without the prior written permission of ITU. Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) iii CONTENTS Page 1) Clause 1, Scope 1 2) Clause 2, Normative references 1 3) Cla

    20、use 3, Definitions 2 4) Clause 4, Abbreviations 2 5) New clauses 9-12 3 6) New Annex E . 36 7) New Annex F . 38 ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 1 INTERNATIONAL STANDARD RECOMMENDATION ITU-T Information technology Relayed multicast protocol: Specification

    21、 for simplex group applications Amendment 1 Security extensions 1) Clause 1, Scope Delete the existing text and replace it with the following: This Recommendation | International Standard specifies the Relayed MultiCast Protocol for simplex group applications (RMCP-2), an application-layer protocol,

    22、 which constructs a multicast tree for data delivery from one sender to multiple receivers over the Internet where IP multicast is not fully deployed. Clauses 5-8 define a basic RMCP-2 protocol without security features, and clauses 9-12 define a secure RMCP-2 protocol that adds security features to

    23、 the basic protocol. Both protocols specify a series of functions and procedures for multicast agents to construct a one-to-many relayed data path and to relay simplex data. They also specify the operations of the session manager to manage multicast sessions. These protocols can be used for applicat

    24、ions that require one-to-many data delivery services, such as multimedia streaming services or file dissemination services. Annex E defines a membership authentication procedure for use with the secure RMCP-2 protocol. Annexes A-D provide informative material related to these protocols. Annex F cont

    25、ains an informative bibliography. 2) Clause 2, Normative references Following the first paragraph, re-order the existing references and add new subheadings as follows: 2.1 Identical Recommendations | International Standards Recommendation ITU-T X.603 (2004) | ISO/IEC 16512-1:2005, Information techno

    26、logy Relayed multicast protocol: Framework. 2.2 Additional references ISO/IEC 9797-2:2002, Information technology Security techniques Message Authentication Codes (MACs) Part 2: Mechanisms using a dedicated hash-function. ISO/IEC 9798-3:1998, Information technology Security techniques Entity authent

    27、ication Part 3: Mechanisms using digital signature techniques. ISO/IEC 18033-2:2006, Information technology Security techniques Encryption algorithms Part 2: Asymmetric ciphers. ISO/IEC 18033-3:2005, Information technology Security techniques Encryption algorithms Part 3: Block ciphers. ISO/IEC 1803

    28、3-4:2005, Information technology Security techniques Encryption algorithms Part 4: Stream ciphers. IETF RFC 2094 (1997), Group Key Management Protocol (GKMP) Architecture. IETF RFC 3546 (2003), Transport Layer Security (TLS) Extensions. IETF RFC 3830 (2004), MIKEY: Multimedia Internet KEYing. IETF R

    29、FC 4279 (2005), Pre-Shared Key Ciphersuites for Transport Layer Security (TLS). IETF RFC 4346 (2006), The Transport Layer Security (TLS) Protocol Version 1.1. IETF RFC 4535 (2006), GSAKMP: Group Secure Association Key Management Protocol. ISO/IEC 16512-2:2008/Amd.1:2010 (E) 2 Rec. ITU-T X.603.1 (200

    30、7)/Amd.1 (11/2009) 3) Clause 3, Definitions Add the following definitions to clause 3: 3.13 RMCP-2 protocol: A relayed multicast protocol for simplex group applications. NOTE When used in clauses 5-8, this term has the same meaning as basic RMCP-2. It is expected that this term will be withdrawn and

    31、 replaced by basic RMCP-2 protocol in future revisions of this Recommendation | International Standard. 3.14 basic RMCP-2 protocol: The relayed multicast protocol for simplex group application defined in clauses 5-8. 3.15 secure RMCP-2 protocol: The relayed multicast protocol supporting security fea

    32、tures for simplex group applications defined in clauses 9-12. 3.16 dedicated multicast agent (DMA): An intermediate MA pre-deployed as a trust server by the Session Manager (SM) in an RMCP session. 3.17 security policy: The set of criteria for the provision of security services, together with the se

    33、t of values for these criteria, resulting from agreement of the security mechanisms defined in 10.1.4. 3.18 TLS_CERT mode: A mode of the TLS defined in IETF RFC 4346 for the authentication of MAs using a certificate. 3.19 TLS_PSK mode: A mode of the TLS defined in IETF RFC 4279 for the authenticatio

    34、n of MAs using a pre-shared key for the TLS key exchange. 3.20 relayed multicast region; RM region: A management zone defined by the use of the session key Ks. 3.21 member multicast region; MM region: A management zone defined by the use of one or more group keys Kg. 3.22 member multicast group; MM

    35、group: 1) (in a multicast disabled area) a group consisting of one DMA and multiple RMAs sharing the same group key Kg. 2) (in a multicast enabled area) a group consisting of one HMA, multiple RMAs together with one or more candidate HMAs sharing the same group key Kg. 3.23 candidate HMA: A DMA that

    36、 is able to assume the role of an HMA, should the original HMA leave or be terminated from a multicast-enabled MM group. 3.24 group attribute (GP_ATTRIBUTE): An attribute that defines whether or not the Content Provider controls the admission of RMAs to the secure RMCP-2 session. 3.25 closed group:

    37、An MM group in which all the RMAs have been allocated a service user identifier from the Content Provider before subscribing to the secure RMCP-2 session. 3.26 open group: An MM group in which none of the RMAs require a service user identifier before subscribing to the secure RMCP-2 session. 4) Clau

    38、se 4, Abbreviations Add the following abbreviations to clause 4: ACL Access Control List AUTH Authentication CEK Contents Encryption Key CP Content Provider HRSREQ Head Required Security Request HRSANS Head Required Security Answer KEYDELIVER Key Delivery SECAGREQ SECurity AGreement REQuest SECAGANS

    39、 SECurity AGreement ANSwer SECALGREQ SECurity ALgorithms REQuest SECLIST Selected sECurity LIST TLS Transport Layer Security ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 3 5) New clauses 9-12 Add the following new clauses: 9 Overview of secure RMCP-2 9.1 Conventions

    40、9.1.1 Use of basic RMCP-2 protocol The term basic RMCP-2 protocol, when used in clauses 9-12, refers to the protocol defined in clauses 5-8. 9.1.2 Hexadecimal notation Code values for message parameters in clause 11 (Format of secure RMCP-2 messages) and clause 12 (Parameters) are expressed in hexad

    41、ecimal notation, e.g., 0x14 for 20 in decimal notation. 9.2 Secure RMCP-2 entities 9.2.1 Introduction The secure RMCP-2 protocol supports security functions of the RMCP-2 used for relayed multicast data transport through unicast communication over the Internet. The secure RMCP-2 protocol components

    42、correspond to those described in the basic RMCP-2 protocol except that a new type of MA, a dedicated multicast agent (DMA), has been introduced. A dedicated multicast agent is an intermediate MA pre-deployed as a trust server by the SM. For secure communication, each session consists of an SM, an SM

    43、A, DMAs, RMAs, together with a single sending application and multiple receiving applications. Their topology, as shown in Figure 85, corresponds with that in the basic RMCP-2 protocol (see 5.1). X.603.1(07)Amd.1(09)_F85SMAReceivingApp.SMReceivingApp.ReceivingApp.SendingApp.RMADMARMA RMAFigure 85 RM

    44、CP-2 service topology with security ISO/IEC 16512-2:2008/Amd.1:2010 (E) 4 Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 9.2.2 Session manager The SM is responsible for maintaining session security, which includes the management of service membership, the management of key and ACL for DMA and RMA, and me

    45、ssage encryption/decryption together with the SM functions of basic RMCP-2. Figure 86 shows an abstract protocol stack for the operation of SM functions. The SM has TLS and multicast session security modules for the provision of security. TLS is used for the initial authentication of DMAs and RMAs w

    46、hen they join the session. The Multicast session security module performs the following security functions after the completion of TLS authentication: a) Security policy; b) Session admission management; c) Session key management; d) Access Control list management; e) Secure group and membership man

    47、agement; f) Message encryption/decryption. Figure 86 Internal structure of the SM 9.2.3 Dedicated multicast agents DMAs are in charge of the secure establishment and maintenance of the RMCP-2 tree, support of membership authentication and data confidentiality. Figure 87 shows the internal structure

    48、of the DMAs with modules for Key/Message Security Management and Group/Member Security Management. These modules support the following security functions: Key/Message Security Management Module a) Group key management; b) Message encryption/decryption; c) Contents encryption key management. Group/Me

    49、mber Security Management Module a) Secure tree configuration; b) Session key management; c) Secure group and membership management. ISO/IEC 16512-2:2008/Amd.1:2010 (E) Rec. ITU-T X.603.1 (2007)/Amd.1 (11/2009) 5 Figure 87 Internal structure of DMAs 9.2.4 Sender and receiver multicast agents The internal structure of the SMA and the RMAs is shown in Figure 88. The structure is the same as for DMAs except that the Group Security Management Module is not included.


    注意事项

    本文(ITU-T X 603 1 AMD 1-2009 Information technology C Relayed multicast protocol Specification for simplex group applications Amendment 1 Security extensions (Study Group 17)《信息技术 多播转发.pdf)为本站会员(progressking105)主动上传,麦多课文档分享仅提供信息存储空间,仅对用户上传内容的表现方式做保护处理,对上载内容本身不做任何修改或编辑。 若此文所含内容侵犯了您的版权或隐私,请立即通知麦多课文档分享(点击联系客服),我们立即给予删除!




    关于我们 - 网站声明 - 网站地图 - 资源地图 - 友情链接 - 网站客服 - 联系我们

    copyright@ 2008-2019 麦多课文库(www.mydoc123.com)网站版权所有
    备案/许可证编号:苏ICP备17064731号-1 

    收起
    展开