Claims
- 1. A method for extending VLAN bridging semantics, comprising the steps of:
providing an untagged frame and a tagged frame in accordance with the IEEE 802.1Q VLAN bridge model; providing a cryptographically encapsulated frame, wherein every encapsulated frame has a VLAN tag that is different from a tag used within tagged frames belonging to said VLAN; providing a trunk port divided into inbound and outbound trunk ports; providing one of said untagged, tagged, and encapsulated frame type for each segment representing a bridged, cryptographic VLAN; and transferring traffic between an unencapsulated segment (tagged or untagged) and an encapsulated segment of a same VLAN.
- 2. The method of claim 1, further comprising the step of:
associating with every VLAN two unique VLAN tags, said two unique VLAN tags comprising VID-T, which is used within tagged frames of said VLAN, and VID-E, which is used within encapsulated frames of said VLAN.
- 3. The method of claim 1, wherein for each VLAN, there is a unique security association comprising a cryptographic authentication code key for checking integrity and authenticity of frames that are tagged as belonging to said VLAN, and a cryptographic key for ensuring privacy of all frames belonging to said VLAN.
- 4. The method of claim 1, wherein said encapsulated frame is encapsulated in accordance with an encrypt-then-MAC method, which comprises the steps of:
encrypting a data payload of a frame; and computing a message authentication code over a resulting ciphertext and said frame's sequence number.
- 5. The method of claim 1, wherein a tagged set, an untagged set, and an encapsulated set of ports is associated with each VLAN.
- 6. The method of claim 1, further comprising the step of:
using a security association for a VLAN to verify authenticity and integrity of every frame tagged as belonging to said VLAN, and received at a port in said VLAN's encapsulated set.
- 7. The method of claim 6, further comprising the step of:
providing an ingress-filtering rule for said port to determine whether verification occurs.
- 8. The method of claim 6, further comprising the step of:
using said association to encapsulate tagged and untagged frames belonging to said VLAN cryptographically before sending them from a port in said VLAN's encapsulated set.
- 9. An apparatus for sending frames in bridged, cryptographic VLANs, comprising:
at least two bridges; a plurality of trunk links wherein every trunk link of said trunk links is associated with the inbound trunk port of one bridge of said at least two bridges and the outbound trunk port of another bridge of said at least two bridges; a plurality of access ports; a plurality of access links wherein every access link of said access links is associated with one access port of said access ports; and means for representing said VLANs by different encapsulated segments even though they share a same medium, wherein physical separation of said VLANs is cryptographic.
- 10. The apparatus of claim 9, further comprising:
an ingress-filtering rule associated with at least one of said access ports for specifying authenticity checking, wherein a frame received at said one of said access ports is authenticated using a security association for an associated VLAN; wherein, if authentication successful, then said frame is determined to be a member of an encapsulated segment for said associated VLAN.
- 11. The apparatus of claim 10, wherein said ingress-filter rule associated with at least one of said access ports specifies authentication and integrity checking for certain of said VLANs.
- 12. The apparatus of claim 11, further comprising:
an authentication code that is computed over a received frame's ciphertext and sequence number using said security association; wherein, if said authentication code does not match a received authentication code in said frame, then said frame is discarded; and wherein said frame is otherwise determined to belong to an encapsulated segment for an associated VLAN.
- 13. The apparatus of claim 9, further comprising:
one or more rules for constructing a target port set for a frame received at an inbound port that belongs to the tagged and encapsulated sets of a VLAN; wherein, every port in the encapsulated set of said VLAN that is not a member of the tagged set of said VLAN is removed if said frame is tagged; and wherein, every port in either the tagged or untagged sets of said VLAN that is not a member of the encapsulated set of said VLAN is removed if said frame is encapsulated.
- 14. The apparatus of claim 9, further comprising:
one or more rules for constructing a forwarding set for a received frame, which rules may comprise any of the following:
add a received frame to said forwarding set; add a VLAN tag to a received frame; add the result to said forwarding set; a received frame is cryptographically encapsulated using a security association; a resulting frame is VLAN tagged and added to said forwarding set; remove a VLAN tag from a received frame; add an untagged frame to said forwarding set; a received frame's ciphertext is decrypted using a security association; a resulting frame is untagged and added to said forwarding set; and a received frame's ciphertext is decrypted using a security association; a resulting frame is tagged and added to said forwarding set.
- 15. A method for forwarding frames of a forwarding set that is defined with respect to the target port set for a received frame of a VLAN, comprising the steps of:
queuing an untagged frame, if any, in said forwarding set, for transmission at every port in said target set that belongs to the untagged set for said VLAN; queuing an VLAN-tagged frame, if any, in said forwarding set, for transmission at every port in said target set that belongs to the tagged set for said VLAN; and queuing an encapsulated frame, if any, in said forwarding set, for transmission at every port in said target set that belongs to the encapsulated set for said VLAN.
- 16. A method for eliminating redundant transfers between LAN segments in a bridged, cryptographic VLAN, comprising the steps of:
avoiding transfer of an unencapsulated frame to a VLAN's encapsulated segment more than once in a bridged VLAN where each transfer requires encryption; performing encapsulation once, said encapsulation being shared by all egress ports that belong to said VLAN's encapsulated set across all bridges; and avoiding repeated decapsulation across bridges in said bridged VLAN where each requires decryption.
- 17. A method for determining optimal transfer points between LAN segments representing a bridged, cryptographic VLAN, comprising the steps of:
reducing any bridged LAN to a spanning tree whose nodes are said bridges and whose edges are trunk links to induce a partial order on said bridges; wherein a least bridge is the root of said spanning tree; wherein the set of bridges together with a partial order define a complete, partially ordered set; and wherein every nonempty subset of said bridges has a least upper bound; wherein said least upper bound of all bridges requiring a received frame of a VLAN to belong to one of said LAN segments representing said VLAN is an optimal transfer point for converting received frames to frames for that LAN segment; and deducing automatically, from an assignment of bridge access ports in said bridged VLAN to said LAN segments, the smallest set of LAN segments that must be associated with a given outbound trunk port in order to bridge said VLAN.
- 18. An apparatus for implementing a transfer point protocol (TPP) in a bridged, cryptographic VLAN, comprising:
at least two bridges; a plurality of trunk links wherein every trunk link of said trunk links is associated with an inbound trunk port of one bridge of said at least two bridges and an outbound trunk port of another bridge of said at least two bridges; a plurality of access ports; a plurality of access links wherein every access link of said access links is associated with one access port of said access ports; and means for representing said VLANs by different encapsulated segments even though they share a same medium, wherein physical separation of said VLANs is cryptographic; two link-layer protocols, a first link-layer protocol (TPP-T) for adding outbound ports to the tagged set of a VLAN, and a second link-layer protocol (TPP-E) for adding outbound ports to the encapsulated set of a VLAN; and wherein every access port is assigned to a tagged, untagged, or encapsulated set for a VLAN prior to execution.
- 19. The apparatus of claim 18, said transfer point protocol (TPP) further comprising:
two frames types, one of said frame types comprising an announce frame, and a second of said frame types comprising a reply frame; wherein each of said frames contains a VLAN ID and a source bridge routing path, where each entry in said path is a unique pair containing a bridge MAC address and three bits, one bit for each LAN segment type, wherein said tagged bit is high if and only if a bridge addressed in said pair has an access port in a tagged set of said VLAN named in said frame, and wherein said untagged and encapsulated bits are set likewise.
- 20. A transfer point protocol (TPP) in a bridged, cryptographic VLAN, comprising the steps of:
a bridge sending a TPP announce frame to a TPP group address through each of its trunk ports for every VLAN known to it; when a bridge receives an announce frame, said bridge appending to received routing path an entry for itself regarding the received VLAN ID, and forwarding said frame to each of its enabled, outbound trunk ports except the receiving trunk port; wherein if said bridge has no other such trunk ports, then said bridge sending a final routing path and said received VLAN ID in a TPP reply frame to the MAC address that precedes said bridge in said routing path; an originating bridge of an announce frame creating a path consisting only of an entry for itself; when a bridge receives a TPP reply frame, said bridge forwarding said reply frame to the bridge MAC address that precedes said bridge in said routing path; and if there is none, discarding said frame.
- 21. The protocol of claim 20, wherein when a bridge receives a TPP reply frame on an inbound trunk port, said bridge adds the outbound port corresponding to said inbound trunk port to the encapsulated set for the VLAN ID in said frame if, and only if, said bridge is followed by another bridge in said routing path with an encapsulated access port, and either:
said bridge has a tagged or untagged access port for said VLAN ID and no bridge after it in said routing path, up to an including said other bridge, has a tagged or untagged access port; or said bridge has an encapsulated access port for said VLAN ID, or said bridge is preceded by another bridge in said routing path with an encapsulated access port.
- 22. The protocol of claim 20, wherein when a bridge receives a TPP reply frame on an inbound trunk port, said bridge adds the outbound port corresponding to said inbound trunk port to the tagged set for the VLAN ID in said frame if, and only if, said bridge is followed by another bridge in said routing path with a tagged or untagged access port, and either:
said bridge has an encapsulated access port for said VLAN ID and no bridge after it in said routing path, up to an including said other bridge, has an encapsulated access port; or said bridge has a tagged or untagged access port for said VLAN ID, or said bridge is preceded by another bridge in said routing path with a tagged or untagged access port.
- 23. The protocol of claim 20, wherein the outbound port of a trunk port is treated as:
a set of virtual, tagged access ports with one said tagged access port for each VLAN supported by said trunk port; a set of virtual, encapsulated access ports with one said encapsulated access port for each VLAN supported by said trunk port; or a set of virtual, encapsulated or virtual, tagged access ports with one said tagged or encapsulated access port for each VLAN supported by said trunk port.
- 24. A protocol for access link displacement in a bridged, cryptographic VLAN, comprising the steps of:
recognizing an access port of a bridge of said bridged VLAN with which a displaced access link can be associated, wherein said access port may be virtual and created automatically; automatically assigning said access port to a LAN segment type based on a segment type of said displaced access link; and executing a transfer port protocol (TPP) for said bridged VLAN with said access port belonging to said assigned LAN segment type.
- 25. A method for establishing a group security association for a cryptographic VLAN comprising m stations, comprising the steps of:
providing an encryption key K v, wherein said encryption key is a symmetric key used by v-aware bridges and stations of v to encrypt and decrypt frames belonging to v; providing an authentication code key K¢ v, wherein all v-aware bridges, and stations of v, compute and verify authentication codes over encrypted frames of v using K¢ v; providing a distribution key K¢¢ v; and providing m random values R1, R2, . . . , Rm, wherein there is one random value for each of said m stations, wherein an ith station of said group knows all m random values except Ri, wherein said m−1 random values that said ith station knows are communicated to it by a v-aware bridge; wherein privacy of said random values is ensured by encryption using said distribution key K¢¢ v, while their authenticity is ensured by an authentication code computed over a resulting ciphertext using said authentication code key K¢ v.
- 26. A method for joining a cryptographic VLAN, comprising the steps of:
adding a new station to a group; and enabling all other stations in said group to eliminate said new station later.
- 27. The method of claim 26, said step of adding a new station to a group further comprising the step of:
a user's station joining a cryptographic VLAN v through a mutual authentication protocol executed between said user, via said user's station, and an authenticator residing on a v-aware bridge; wherein if mutual authentication succeeds, a secure ephemeral channel is created between said v-aware bridge and said new station to transfer an encryption key K v, an authentication code key K¢ v, and m random values R1, R2, . . . , Rm securely from said v-aware bridge to said new station, in which case said enabling step executes; otherwise, said protocol terminates immediately.
- 28. The method of claim 27, said step of enabling all other stations in said group to eliminate said new station later further comprising the steps of:
said v-aware bridge choosing a new random value Rm+1 for said new station, and distributing said new random value Rm+1 to all v-aware bridges, and stations comprising v, in a broadcast frame that is encrypted under a distribution key K¢¢ v and that carries an authentication code computed over ciphertext using K¢ v, said bridge then creating a new distribution key for v and distributing said new distribution key to all v-aware bridges and to members of v, including said new station, in a broadcast frame that is encrypted under K v and that carries an authentication code computed over said ciphertext using K¢ v.
- 29. The method of claim 28, wherein said new station can verify authenticity of a broadcast containing its own random value Rm+1, but is unable to decrypt said broadcast because it does not hold key K¢¢ v.
- 30. A method for leaving a cryptographic VLAN, comprising the steps of:
detecting with a v-aware bridge a subgroup of stations 1, . . . , k simultaneously leaving a cryptographic VLAN v; said bridge v-aware announcing the departure of said stations 1, . . . , k via a single broadcast frame that comprises an authentication code computed over said frame using an authentication code key K¢ v, wherein said broadcast notifies every v-aware bridge and station in group v that stations 1, . . . , k have left; each such bridge and station then attempting to rekey encryption, authentication code, and distribution keys for v, each as a function of an old key and random values R1, . . . , Rk; and every v-aware bridge and all remaining stations in groupv sharing a new security association as a result, comprising k fewer random values.
- 31. The method of claim 30, wherein every v-aware bridge always has a current distribution key for v; and
wherein every v-aware bridge always has a complete set of random values for any subgroup that leaves group v, thereby allowing it to always rekey the keys for group v.
- 32. The method of claim 30, wherein for stations rekeying is a function of random values for departing stations that these stations do not have, wherein said stations are unable to rekey.
- 33. The method of claim 30, wherein a departed station can never become a member of groujp v again as a result of subsequent rekeyings because rekeying is a function of current keys, and all keys arrived at thereafter are always a function of a random value unknown to said departed station.
- 34. The method of claim 30, wherein a departed station can only become a member of v again by rejoining v.
CROSS-REFERENCE TO RELATED APPLICATIONS
[0001] This application is a Continuation-in-Part of U.S. patent application Ser. No. 10/057,566, filed Jan. 25, 2002 (Attorney Docket No. CRAN0006).
Continuation in Parts (1)
|
Number |
Date |
Country |
Parent |
10057566 |
Jan 2002 |
US |
Child |
10286634 |
Nov 2002 |
US |