Cryptographic peer discovery, authentication, and authorization for on-path signaling
First Claim
1. A method for secure network device policy configuration, the method comprising the computer-implemented steps of:
- storing a mapping between a group identifier and a particular cryptographic key, wherein the group identifier identifies a group of three or more network devices;
intercepting, at an intermediary network device, one or more data packets that (a) are addressed to a destination device other than the intermediary network device, (b) collectively contain a request, and (c) collectively contain the group identifier;
selecting, from among one or more cryptographic keys that are stored at the intermediary network device, the particular cryptographic key that is mapped to the group identifier;
determining whether a mutual authentication process is successful between the intermediary network device and an upstream device that sent the one or more data packets toward to the intermediary network device; and
in response to determining that the mutual authentication process is successful between the intermediary network device and the upstream device, configuring, based on the request, a policy of the intermediary network device.
0 Assignments
0 Petitions
Accused Products
Abstract
A method is disclosed for cryptographic peer discovery, authentication, and authorization. According to one embodiment, a data packet, which is addressed to a destination device other than an intermediary network device, is intercepted at the intermediary network device. The data packet contains a request and a group identifier. A shared secret cryptographic key, which is mapped to the group identifier, is selected. A challenge is sent toward an upstream device from whence the data packet came. A response is received. A verification value is generated based on the cryptographic key and the challenge. It is determined whether the response matches the verification value. If the response matches the verification value, then it is determined whether the request is allowed by an authorization set that is mapped to the group identifier. If the request is allowed, then a policy of the intermediary network device is configured based on the request.
28 Citations
15 Claims
-
1. A method for secure network device policy configuration, the method comprising the computer-implemented steps of:
-
storing a mapping between a group identifier and a particular cryptographic key, wherein the group identifier identifies a group of three or more network devices; intercepting, at an intermediary network device, one or more data packets that (a) are addressed to a destination device other than the intermediary network device, (b) collectively contain a request, and (c) collectively contain the group identifier; selecting, from among one or more cryptographic keys that are stored at the intermediary network device, the particular cryptographic key that is mapped to the group identifier; determining whether a mutual authentication process is successful between the intermediary network device and an upstream device that sent the one or more data packets toward to the intermediary network device; and in response to determining that the mutual authentication process is successful between the intermediary network device and the upstream device, configuring, based on the request, a policy of the intermediary network device. - View Dependent Claims (2, 3, 4, 5)
-
-
6. An apparatus for secure network device policy configuration, comprising:
-
means for storing a mapping between a group identifier and a particular cryptographic key, wherein the group identifier identifies a group of three or more network devices; means for intercepting, at an intermediary network device, one or more data packets that (a) are addressed to a destination device other than the intermediary network device, (b) collectively contain a request, and (c) collectively contain the group identifier; means for selecting, from among one or more cryptographic keys that are stored at the intermediary network device, the particular cryptographic key that is mapped to the group identifier; means for determining whether a mutual authentication process is successful between the intermediary network device and an upstream device that sent the one or more data packets toward to the intermediary network device; and means for configuring, in response to determining that the mutual authentication process is successful between the intermediary network device and the upstream device, based on the request, a policy of the intermediary network device. - View Dependent Claims (7, 8, 9, 10)
-
-
11. An apparatus for secure network device policy configuration, comprising:
-
a network interface that is coupled to a data network for receiving one or more packet flows therefrom; a processor; one or more stored sequences of instructions which, when executed by the processor, cause the processor to carry out the steps of; storing a mapping between a group identifier and a particular cryptographic key, wherein the group identifier identifies a group of three or more network devices; intercepting, at an intermediary network device, one or more data packets that (a) are addressed to a destination device other than the intermediary network device, (b) collectively contain a request, and (c) collectively contain the group identifier; selecting, from among one or more cryptographic keys that are stored at the intermediary network device, the particular cryptographic key that is mapped to the group identifier; determining whether a mutual authentication process is successful between the intermediary network device and an upstream device that sent the one or more data packets toward to the intermediary network device; and in response to determining that the mutual authentication process is successful between the intermediary network device and the upstream device, configuring, based on the request, a policy of the intermediary network device. - View Dependent Claims (12, 13, 14, 15)
-
Specification