This application is based upon and claims the benefit of priority from prior Japanese Patent Application No. 2003-208272, filed Aug. 21, 2003, the entire contents of which are incorporated herein by reference.
1. Field of the Invention
The present invention relates to a server apparatus, and a method of distributing security setting information of a host computer joining a network such as Internet or intranet.
2. Description of the Related Art
It is thought that the communication mode of Internet shifts to end-to-end communication by introduction of IPv6 (Internet Protocol Version 6) which is a next generation technique. With the assumption that communications apparatuses communicate directly to each other, a guarantee of security in each communication channel is more and more necessary. There is IPsec (IP security Protocol) as a technique to realize the security guarantee in the communication channel. IPsec is a security protocol to provide authentication and encryption in a network layer in OSI reference model, and standardized in an Internet Engineering Task Force (IETF). A communications apparatus with an IPsec function can provide authentication of destination communications apparatus, and safety and security of communication data.
When performing communications using IPsec, it is necessary to match a communications source with a communications destination on a security class such as what kind of authentication algorithm or encryption algorithm should be used or what kind of encryption key should be used. This matching is realized by SA (Security Association) in IPsec.
The communications apparatus with an IPsec function holds an information group which defines Internet address information to distinguish a destination communications apparatus applying security, information to indicate whether or not IPsec should be applied, information to indicate which security protocol should be applied. Also, it has an access restraint function. In IPsec, this information group is realized by a security policy (SP) (referred to as IETF IPsec Policy Information Base, January 2003).
The concept of the security policy is not limited to the above case. As a measure to ensure security in end-to-end communications is thought the following method. It is a measure to pass only a particular packet such as a firewall. This can realize security of a network by blocking an access between a network to which a communications apparatus belongs to and an external network. Alternatively, concealing an address of a gateway or a router which is arranged on the network makes it possible to ensure communications between the self-network and the external network. In this case, the transmission to the external becomes impossible, resulting in that danger of data leak and the like can be reduced.
Conventionally, for the purpose of setting a security policy of IPsec to a security policy database of the communications apparatus, it is necessary that an administrator of a communications apparatus joining a network or a user thereof sets manually the security policy to the database. Alternatively, if a distribution method is a prescribed security method, it is necessary to refer to individually the security policy servers installed according to security methods, respectively. Even if the latter method can employ, it is not found whether there is a security policy server. Even if it was found, a reference destination (IP address, for example) may not be unified every network.
A book-size personal computer or PDA (Personal Digital Assistant) which may be connected often to different networks must be subjected to a security policy setting whenever it starts a new connection while moving between network links. The latter method as well as the former method has a problem that a work to change a reference destination every network is complicated for a user.
It is an object of the present invention to provide a communication system which is able to acquire security policy information necessary for communications in a connection destination network link without assistance, and reduce an operation load of security policy distribution, a method of distributing a security policy in the communication system, and a server apparatus.
An aspect of the invention provides a server apparatus connected to a network and a host computer via the network, comprising: a server memory to store data indicating a plurality of different security policies necessary for communications in the network; a server receiver to receive a request message for requesting transmission of data of a security policy from the host computer; and a server transmitter to transmit a notification message including data of the security policy in response to the request message.
Another aspect of the invention provides a server apparatus connected to a network, comprising: a server memory to store security policy data indicating a plurality of security policies necessary for communications in the network, and a server transmitter to transmit a notification message including the security policy data to a multicast address periodically or when contents stored in the server memory changes.
Another aspect of the invention provides a method of distributing a security policy to a network, comprising: connecting a security policy server storing data indicating a plurality of different security policies necessary for communications in the network to the network; requesting transmission of data of a security policy to the security policy server; and transmitting a notification message including the data of the security policy from the security policy server to a multicast address in response to the requesting.
Another aspect of the invention provides a method of distributing a security policy to a network, comprising: connecting a security policy server storing security policy data indicating a plurality of security policies necessary for communications in the network, and transmitting a notification message including the security policy data to a multicast address periodically or when contents stored in the server memory changes.
There will now be described an embodiment of the present invention in conjunction with the accompanying drawings.
The host computer H1 includes a transmitter module 14 to transmit the request message to a server multicast address of the server SPS1, a receiver module 15 to receive the notification message from the server SPS1, and a memory 16 to store data of a security policy included in the notification message received by the host receiver.
The router R1, the security policy server SPS1, and the host computer H1 each comprises a communications apparatus including a computer providing with a network function. The arbitrary number of communication apparatuses may be connected to the network link L1. The router R1 may be a security gateway. The router (or security gateway) R1 and the security policy server SPS1 may comprise a physically identical apparatus. The network link L1 comprises a network configured with a physical layer of, for example, an Ethernet (trademark) and an upper layer of TCP/IP.
In the present embodiment, assuming that in the network link L1 a packet communication is carried out through IPsec (IP security Protocol) standardized in an Internet Engineering Task Force (IETF). IPsec is a security protocol to provide authentication and encryption in a network layer in an OSI reference model. The packet exchanged between the communications apparatuses connected to the network link L1 is encrypted at the time of transmitting. This encrypted packet is decoded by a communications apparatus of a receiving destination. Then, an authentication process of a communications apparatus for transmitting the encrypted packet is carried out, too. As thus described, the communications apparatus provided with the IPsec function realizes authentication of the communications apparatus, and safety and secrecy of communication data are enabled.
In the network link L1, two multicast addresses to set the link L1 to a local scope are defined. The two multicast addresses are effective only within the link L1. It is essential that the two multicast addresses are well known.
The first multicast address is the “all-nodes multicast address” that all nodes in the local scope of the network link L1 join. When the security policy server SPS1 notifies the host computer H1 connected to the network link L1 of a message of security policy information, the all-nodes multicast address is a multicast address designated to the destination. That a node joins the multicast means that the node can receive an IP packet addressed to the multicast.
The second multicast address is the “all-security-policy-servers multicast address” that all security policy servers in the local scope of the network link L1 join. When the host computer H1 notifies the security policy server SPS1 connected to the network link L1 of a message, the all-security-policy-servers multicast address is a multicast address designated to the destination thereof.
As described above, the all-security-policy-servers multicast address is known. This situation is essential. Of course, the host computer H1 has to know the all-security-policy-servers multicast address. However, the host computer H1 may not know IP address of the security policy server SPS1 joining the all-security-policy-server multicast address in communication of security policy information.
As messages used for automating the setting of a security policy related to the embodiment of the present invention are defined a security policy request message and a security policy notification message. The kinds of these messages may be realized by the types of ICMPv6 (Internet Control Message Protocol Version 6).
(Security Policy Server Notification Message)
A security policy server notification message is a message to notify of security policy information in the network link L1 from the security policy server SPS1. Usually, the message is transmitted to the all-nodes multicast address of the link local scope at a constant interval. However, if the security policy server request message described hereinafter is transmitted beforehand by the host computer Hi, there is a case that a security policy server notification message is transmitted not by a multicast but by a unicast.
The security policy information notified by a security policy server notification message is set to a security policy database of each of the communications apparatuses using IPsec.
As described above, when communications using IPsec are carried out, it is necessary to take matching between the communication source and communication destination on a security class concerning what kind of authentication algorithm or encryption algorithm is used or what kind of encryption key is used. This matching is realized by SA (Security Association) in IPsec.
The communications apparatus provided with an IPsec function holds an information group defining Internet address information for distinguishing a destination communications apparatus applying security, information applying IPsec, and information indicating which security protocol should be applied, and the like. The communications apparatus also has an access specification function. In IPsec, the information group is realized by a security policy (SP). Data corresponding to such security policy information is described in a data field of a security policy server notification message.
(Security Policy Server Request Message)
A security policy server request message is a message for requesting transmission of a security policy server notification message to the security policy server SPS1 of the network link L1
The functional elements can be realized by a computer program to be executed on the security policy server SPS1. When this program is executed, at first the security policy server SPS1 changes to steady-state sst0 as shown in
In the present embodiment, the security policy server SPS1 assumes to determine a security policy within the network link L1. In other words, a network administrator or a system administrator assumes to set a security policy in the policy server SPS1. This set security policy is effective in the network link L1, and transmitted by multicasting to all nodes (communications apparatuses) in the link L1 according to the security policy server notification message.
Not the security policy server SPS1 but rather the other security policy server (not shown) may be connected to the link L1, to determine a security policy.
The function for transmitting the security policy server request message is not always necessary in the case of the following. For example, even if the security policy server SPS1 does not receive a security policy server request message from the host computer H1, it may multicast a security policy server notification message periodically or at necessary timing. As thus described, a desired effect can be obtained even if the request message is not transmitted from the host computer H1.
The functional elements can be realized by a computer program executable on the host computer H1. When this program is executed, the security policy server SPS1 changes to initial state hst0 as shown in
If the security policy server SPS1 receives a security policy server notification message in the initial state hst0, it changes to state hst2 for subjecting the message to a receiving process. Then, it changes to status hst3. In this status hst3, the security policy server SPS1 refers to the security policy database (not shown) in the host computer H1, and determines whether or not the security policy data described in the security policy notification message subjected to the receiving process in the state hst2 is unset to the security policy database. If the determination result in this status hst3 is YES, the security policy server SPS1 changes to state hst4 to write the security policy data in the security policy database.
If the determination result in the state hst3 is Yes, it is a case where security policy data is not stored in the security policy database at all and a case where the currently received security policy data is new than that stored in the security policy database. If the determination result in the state hst3 is No, that is, updating of the security policy database is unnecessary, the security policy server SPS1 changes to a steady-state of state hst5. In addition, the security policy server SPS1 changes to the steady-state of state hst5 after setting the security policy in state hst4, too.
An operation example of the communication system related to the present embodiment will be described in conjunction with
In a first operation example, when the host computer H1 is connected to the network link L1, the host computer H1 waits for a security policy notification message transmitted to the all-nodes multicast address from the security policy server SPS1 periodically or at the time when notification is necessary again. Then, the security policy server SPS1 transmits a security policy notification message M1 to the all-nodes multicast address (dst: [ff02::1]) as shown in
In the second operation example, when the host computer H1 is connected to the network link L1, it transmits a security policy request message M2 to the all-security-policy-servers multicast addresses immediately as shown in
The security policy server SPS1 transmits a security policy notification message M3 in response to the security policy request message M2 as shown in
The security policy server SPS1 may transmit the security policy notification message M3 in a unicast by designating the IP address of the host computer H1 because the IP address of the host computer H1 can be specified by the security policy request message M2. Of course, the security policy server SPS1 may transmit the security policy notification message M3 in multicast to the all-nodes multicast address (dst: [ff02::1]) like the security policy notification message M1.
In the first operation example, if the host computer cannot receive the security policy notification message for a while when it is connected to the network, the host transmitter may transmit the request message after a give time (several minutes) from when the host computer is connected to the network.
In either of the first and second operation examples, the host computer H1 sets a security policy of IPsec according to the operation example described referring to
In the case where a plurality of security policy servers exist on the identical network link L1, and the host computer H1 receives a different security policy notification message from each of the security policy servers, the security policy notification message may include an unjust notice. For this reason, the host computer H1 accords to not an automatic setting but a security policy established by a user of the host computer H1 or an administrator thereof beforehand. However, if any one of the security policy notification messages is signed by a public key, and data integrity and safety are recognized by an authentication result, the host computer H1 sets automatically the security policy according to the contents of the security policy notification message.
According to the present embodiment described above, even if IP address of the security policy server SPS1 is unclear, the host computer H1 can automatically set the security policy of IPsec. Consequently, a complicated work for the security policy setting needed when a network of a link destination changes can be reduced.
It is possible to contain information required for passing though a gateway, a router or a firewall alone or along with information employed in IPsec in the security policy notification message distributed by the embodiment.
In a concrete example, a destination address of gateways and the like, a port number thereof, a log-on ID/password thereof, a cryptic key used for ciphering communication data between gateways and the like.
According to the above configuration, it becomes possible to distribute easily various information necessary for communication through a network without a user and an administrator.
Additional advantages and modifications will readily occur to those skilled in the art. Therefore, the invention in its broader aspects is not limited to the specific details and representative embodiments shown and described herein. Accordingly, various modifications may be made without departing from the spirit or scope of the general inventive concept as defined by the appended claims and their equivalents.
Number | Date | Country | Kind |
---|---|---|---|
2003-208272 | Aug 2003 | JP | national |