A kind of reliable network access frameworkTechnical field
The present invention relates to computer network framework, gateway, network service standard, computer program, relate in particular to a kind of reliable network access framework and nucleus equipment thereof, belong to information security field.
Background technology
Along with informationalized development gradually, computer network is deep day by day to the mankind's influence, and information security issue has become important social concern.One talks information security, people expect often be to resist the virus from the computer outside, hacker's attack and invasion and attack, and then expect antivirus software and " fire compartment wall ", but often ignore to come the attack of network internal.According to the statistics of world security circle, the attack that various computer networks suffer and to destroy 80% be to come from inside.At present, information security measure in the industry mainly is to plug up a leak, do high-wall, anti-outer attack etc. " old three samples ", but final result is hard to guard against.The main cause that produces this situation is that we do not go to control root---the terminal that produces unsafe problems, and always carries out shutoff in the periphery.Therefore, we should set about from the safety that improves use node self based on the pattern of " in anti-, inside and outside hold concurrently anti-", construct positive, comprehensive security protection system.
The authoritative institution of reliable computing technology is credible computation organization (Trusted ComputingGroup) in the world at present, this tissue is devoted to the formulation of trusted technology correlation technique standard always, face the diverse network attack at trusted terminal, TCG formulated based on the network of trusted technology connect standard (TrustedNetwork Connect, TNC).Credible calculating at first guarantees the credibility of all terminals, i.e. expecting of behavior set up believable network system by believable terminal, improves the controllability to network.
The main purpose of TNC framework is by providing a framework of being made up of the various protocols standard to realize the polynary network standard of a cover, and it provides following function:
Platform is differentiated: be used to verify network access request person's identity, and the integrality state of platform.
Terminal strategy mandate: for the state of terminal is set up a confidence levels, for example: confirm existence, state, the upgrade case of application program, the version of the rule base of upgrading anti-virus software and IDS, the Patch-level of terminal operating system and application program etc.Thereby thereby make terminal be given one can logging in network authorization policy obtain access to netwoks power under certain control of authority.
Access strategy: confirm terminal machine and its user's authority, and set up confidence levels in the past, the already present standard of balance, product and technology at its connection network.
Assess, isolate and remedy: confirm that the terminal function that does not meet credible policy requirement is isolated in outside the trustable network, if possible carry out the remedial measure that is fit to.
1, the basic framework of TNC and related entities
The basic framework of TNC mainly comprises three entities, three levels and several interface modules etc.This framework has increased two-layer on traditional network insertion level, but the integrity verification between implementation platform, thus satisfy credibility, integrality and fail safe.
2, three class primary entities:
Request visitor AR (the Access Requestor): function is for sending access request, and collecting platform integrality reliable information sends to PDP, connects thereby set up network.This entity comprises following assembly: network access request person (NAR) is responsible for sending access request, sets up network and connects.On an AR several different NAR can be arranged, the difference of setting up with network connects; TNC client (TNCC) is responsible for gathering the integrity measurement information from IMC, measures and report the integrity information of platform and IMC self simultaneously; Integrity measurement gatherer (IMC) is carried out the integrity properties of measuring AR.On an AR, a plurality of different IMC can be arranged.
Strategy execution person PEP (Policy Enforcement Point): this assembly control is to the visit of protected network.Whether PEP consulting PDP decides visit should be performed.
Strategic decision-making person PDP (Policy Decision Point): function for according to the recommendation of TNCS and local security policy to the judgement of making a strategic decision of the access request of AR, result of determination for allow/forbid/isolate.This entity comprises following three assemblies: access to netwoks mandate (NAA) determines whether the access request of an AR is allowed to.Whether NAA can seek advice from TNCS and decide the integrality state of AR consistent with the security strategy of NAA, thereby whether the access request of decision AR is allowed to; TNC server (TNCS) is responsible for the information flow between control IMV and the IMC, gathers the visit decision from IMV, and forms the visit decision of an overall situation, passes to NAA; Integrity measurement discriminator (IMV) is responsible for the integrity measurement value about AR that receives from IMC is differentiated, and is made the visit decision.
3, three basic layers:
Network access layer (Network Access Layer): this one deck is used to support traditional network interconnection technique, as 802.1X, and VPN, mechanism such as AAA Server.In this one deck the inside three entity: NAR, PEP and PDP are arranged.
Integrity assessment layer (Integrity Evaluation Layer): the integrality of being responsible for the entity of all request accesses network of assessment.There are two important interface: IF-IMC (IntegrityMeasurement Collector Interface) and IF-IMV (Integrity Measurement VerifierInterface) in this one deck and upper strata.Wherein, IF-IMV is that IMC is with the interface between the TNCC.The major function of this interface is to collect the integrity measurement value from IMC, and supports IMC with the information flow between the IMV; : IF-IMV is the interface between IMV and the TNCS.The major function of this interface is that the integrity measurement value that will obtain from IMC passes to IMV, supports IMC with the information flow between the IMV, and the visit decision that IMV made is passed to TNCS.
Integrity measurement layer (Integrity Measurement Layer): the assembly of collection and check request visitor's integrality relevant information.
4, other important interface module:
IF-TNCCS is the interface between TNCC and the TNCS.This interface definition an agreement, this agreement is transmitted following information: the information from IMC to IMV (as the integrity measurement value); Information from IMV to IMC (as requiring extra integrity measurement value); Session management information and some synchronizing informations.
IMC and IMV interface (IF-M): IF-M are the interfaces between IMC and the IMV.If some information relevant of the information spinner that on this interface, transmits with provider.
Network authorization host-host protocol (IF-T): IF-T is maintained in the message transmission between AR entity and the PDP entity.The assembly of safeguarding this interface in these two entities is NAR and NAA.
Policy enforcement point interface (IF-PEP): IF-PEP is the interface between PDP and the PEP.This interface is safeguarded the message transmission between PDP and the PEP.By it, PDP can indicate PEP that AR is carried out to a certain degree isolation, so that AR is repaired.After reparation is finished, can authorize the right of AR accesses network.
Summary of the invention
Purpose of the present invention is based on existing domestic and international trustable network interconnection technique research and analysis, the credible network connecting construction that has proposed to have independent intellectual property right.There are three entities in this credible network connecting construction: access requestor, access controller and policy manager, policy manager manages and realizes that to access requestor and access controller the two-way user identity between them differentiates and the platform integrity assessment, access requestor and access controller are controlled local port according to the decision-making of policy manager, thereby realize credible network connecting construction.
Credible network connecting construction was measured its platform status before accessing terminal to network, have only the security strategy of satisfying just to allow to be linked in the network, making directly access network of some computers that computer network is had a potential threat, is method a kind of active, that take precautions against in advance.Credible network connecting construction is an important component part of credible counting system structure, and purpose is that trust chain is extended to network from terminal, makes the trusted status of terminal expand to the interconnected systems of terminal.
The invention provides the nucleus equipment of trustable network connecting frame and realization trustable network, can not only control the trusted terminal access network, can also finish two-way user identity discriminating, the discriminating of two-way user platform identity and platform thermodynamic state verification to terminal, and can assess, isolate and repair terminal.Simultaneously, lay a good foundation for credible computing terminal, access control equipment, tactical management equipment, authenticating device, the Network Security Device of compatible different vendor.
1, basic framework
Credible network connecting construction is as shown in Figure 1:
Credible network connecting construction is described functional hierarchy, entity, assembly and interface.This framework is divided into three functional hierarchies: access to netwoks key-course, credible platform evaluation layer and integrity measurement layer; Have three entities: access requestor, access controller and policy manager; Each entity has comprised some functional units, is depositing a series of interfaces between the assembly.
2, entity
Credible network connecting construction has three entities:
Access requestor AR (Access Requestor): the entity that request connects.Its function is for sending access request, finishes with the user identity of access controller and differentiates, collects the integrity measurement value and sends to access controller, finish and access controller between the completeness of platform assessment, wait for that setting up network connects.This entity comprises following assembly: network access request person, trustable network connect client and integrality gatherer.
Access controller AC (Access Controller): function is the visit of control access requestor to network, receives the platform credible identification strategy and the assessment strategy of policy manager distribution; Receive the integrity measurement value of access requestor, collect the integrity measurement value of self, these integrity measurement values are sent to policy manager; Decision-making according to policy manager is carried out.This entity comprises following assembly: access to netwoks effector, trustable network Connection Service end and integrality gatherer.
Policy manager PM (Policy Manager): policy manager is responsible to define and distributing network access control policy and credible assessment strategy, assisting access requestor and access controller to carry out user identity differentiates, the validity of the AIK certificate of authentication-access requestor and access controller, the completeness of platform of verification access requestor and access controller, the Policy Result of the access to netwoks control of generation access requestor and access controller.This entity comprises following assembly: identification strategy server, assessment strategy server and completeness check person.
This framework is the logical architecture of credible network connecting construction, and entity or assembly can be a software, also can be an equipment, or even a cover system.A plurality of entities can be implemented on the different equipment with assembly, also can be implemented in as required on the equipment.
3, level
Credible network connecting construction is divided into three levels from bottom to up:
Access to netwoks key-course (Network Access Control Layer): realize the two-way user identity discriminating between network access request person and the access to netwoks effector.It is to utilize trusted third party's entity that network access request person and access to netwoks effector's user identity is differentiated, promptly the identification strategy server realizes, access requestor and access controller are reciprocity in discrimination process.Access requestor and access controller are controlled the port of self according to the user identity identification result of access to netwoks key-course and the access decision-making of credible platform evaluation layer, thereby realize mutual access control.
Credible platform evaluation layer (Trusted Platform Evaluation Layer): realize that trustable network connects the completeness of platform assessment between client and the trustable network Connection Service end.Trustable network connects the completeness of platform assessment of client and trustable network Connection Service end, utilizes trusted third party, and promptly the assessment strategy server realizes.The completeness of platform assessment comprises discriminating of platform identity and platform completeness check.In the credible platform evaluation process, the checking and the completeness of platform verification of the AIK certificate of access requestor and access controller are finished by policy manager.Policy manager makes a policy to the completeness of platform of access requestor and access controller, and the access to netwoks key-course is carried out according to this decision-making and connected control.
Integrity measurement layer (Integrity Measurement Layer): the completeness of platform of being responsible for collection and verification access requestor and access controller.The integrality gatherer of access requestor and access controller collects the integrity information of platform separately respectively, and the completeness check person of policy manager is responsible for the completeness of platform of verification access requestor and access controller.
4, functional unit
Credible network connecting construction comprises following functional unit:
Network access request person (Network Access Requestor, NAR): function is initiated access request for being responsible for to access controller, realizes the two-way user identity discriminating on the access to netwoks key-course of access requestor and access controller; Be responsible for protocol data to access controller or policy manager forwarding credible platform evaluation layer; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the connection control to access controller.
The access to netwoks effector (Network Access Controller, NAC): function is differentiated for the two-way user identity of realizing access requestor and access controller; Be responsible for transmitting the protocol data of credible platform evaluation layer to network access request person and identification strategy server; According to the Policy Result of identification strategy server generation and the Policy Result of assessment strategy server generation, the port of self is controlled to realize the access control to access requestor.
(Authentication Policy Server, APS): function is for serving as trusted third party, and the two-way user identity of being responsible between realization access requestor and the access controller is differentiated for identification strategy server.
Trustable network connects client (TNC Client, TNCC): function is for asking and receive the integrality metric by the IF-IMC interface to upper strata integrality gatherer, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the connection decision-making and sends to network access request person.
Trustable network Connection Service end (TNC Server, TNCS): function is for asking and receive the integrality metric by the IF-IMC interface to upper strata integrality gatherer, realize the bi-directional platform integrity assessment of access requestor and access controller, the assessment result that generates according to the assessment strategy server generates the access decision-making and sends to the access to netwoks effector.
(Evaluation Policy Server, EPS): function realizes the bi-directional platform integrity assessment of access requestor and access controller for serving as trusted third party to the assessment strategy server.The validity of the AIK certificate of assessment strategy server authentication-access requestor and access controller, send the platform integrity metric value of access requestor and access controller by the IF-IMV interface to upper strata completeness check person IMV, and receive the check results of the platform integrity metric value of the access requestor that returns by IMV and access controller.
Integrality gatherer (Integrity Measurement Collector, IMC): the integrity service of function for utilizing credible calculating platform to provide, the completeness of platform information of collecting access requestor and access controller.
(Integrity Measurement Verifier, IMV): function is for utilizing Integrity Management mechanism, the completeness of platform information of verification access requestor and access controller for the completeness check person.
5, interface
Credible network connecting construction has a plurality of interfaces.These interface definitions between the assembly relation and the agreement between the assembly and exchange messages.These interfaces are:
Trustable network coffret (Trusted Network Transport Interface, IF-TNT): the interface between network access request person and the access to netwoks effector, integrality have defined the information exchange between network access request person and the access to netwoks effector.
Identification strategy service interface (Authentication Policy Service Interface, IF-APS): the interface between access to netwoks effector and the identification strategy server has defined the information exchange between access to netwoks effector and the identification strategy server.
Trustable network connects client-trustable network Connection Service end interface (TNC Client-ServerInterface, IF-TNCCS): trustable network connects the interface between client and the trustable network Connection Service end, has defined the information exchange between trustable network connection client and the trustable network Connection Service end.
Assessment strategy service interface (Evaluation Policy Service Interface, IF-EPS): trustable network connects the interface between client trustable network Connection Service end and the assessment strategy server, has defined the information exchange between trustable network Connection Service end and the assessment strategy server.
The integrity measurement interface (Integrity Measurement Interface, IF-IM): the interface between integrality gatherer and the completeness check person, the interoperability agreement between the integrality gatherer of this each manufacturers produce of interface definition and the completeness check person.
Integrity measurement is collected interface (Integrity Measurement Collector Interface, IF-IMC): trustable network connects between client and the integrality gatherer and the protocol interface between trustable network Connection Service end and the integrality gatherer, this interface definition request and receiving platform integrity information.
Integrity measurement verification interface (Integrity Measurement Verifier Interface, IF-IMV): the protocol interface between assessment strategy server and the completeness check person, this interface definition send the agreement of completeness of platform information to the check results of integrality verifier and receiving platform integrity information.
Beneficial effect
The key management of this credible network connecting construction is simplified in the introducing of policy manager, has improved the extensibility of this architecture simultaneously.
Assessment strategy server's introducing in the policy manager, help the centralized management and the distribution of platform credible strategy, serve as trusted third party, make the completeness of platform assessment of credible platform evaluation layer have higher fail safe, realized the concentrated verification of completeness of platform simultaneously.
Description of drawings
Fig. 1 credible network connecting construction
The information flow chart of Fig. 2 credible network connecting construction
Numeral wherein is corresponding to the step of information flow
Embodiment
Information flow
The once complete information flow of credible network connecting construction as shown in Figure 2.
The information flow of credible network connecting construction is:
(1) network access request person initiates access request to the access to netwoks effector;
(2) after the access to netwoks effector receives network access request person's access request, realize that with network access request person and identification strategy server the two-way user identity of access requestor and access controller is differentiated.In the user identity discrimination process, policy manager serves as trusted third party, consults a master key between access requestor and the access controller.Access requestor and access controller utilize this master key to consult session key between them.Simultaneously, access requestor and access controller are controlled local port according to the result of two-way user identity discriminating;
(3) after user identity discriminating and the key agreement success, network access request person is mail to successful information trustable network respectively with the access to netwoks effector and is connected client and trustable network Connection Service end;
(4) after trustable network Connection Service end is received this successful information, the bi-directional platform integrity assessment of requestor and access controller conducts interviews---and the platform identity is differentiated and the platform completeness check, wherein the assessment strategy server is responsible for the AIK certificate of authentication-access requestor and access controller and the completeness of platform of verification access requestor and access controller, finally generates the completeness of platform assessment result of access requestor and access controller.In the completeness of platform evaluation process, integrality gatherer and completeness check person that trustable network connects client, trustable network Connection Service end and assessment strategy server needs and integrity measurement layer carry out information interaction;
(5) after the assessment of the completeness of platform of access requestor and access controller is finished, trustable network connects client and trustable network Connection Service end inserts decision-making accordingly according to the completeness of platform assessment result generation that the assessment strategy server generates, and sends to network access request person and access to netwoks effector respectively;
Network access request person and access to netwoks effector control local port according to the access decision-making (allowing/forbid/isolate) of receiving separately, thereby realization credible network connecting construction, be access controller according to of the visit of Decision Control access requestor to network, and access requestor judges whether to be connected to this network according to decision-making.
Access requestor
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, network access request module, trustable network connect client, integrality collection module.
Access controller
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, access to netwoks control module, trustable network Connection Service module, integrality collection module.
Policy manager
Hardware: have the complete host computer system of credible platform control module, comprise processor, memory, network adapter etc.
Software: operating system, platform credible service, identification strategy service module, assessment strategy service module, completeness check module.
This programme and TNC contrast
There is not policy manager among the TNC. This programme adds policy manager, in the set of strategies to trustable network Centralized Control is convenient in management; Concentrating of strategy and platform check avoided because controller is led by attack The terminal that causes is under attack; The key of credible network connecting construction has been simplified in the wherein introducing of diploma system Manage, improved simultaneously the extensibility of this architecture.
The assessment strategy server is conducive to centralized management and the distribution of platform credible strategy, serves as the credible the 3rd The side so that the assessment of the completeness of platform of credible platform evaluation layer has higher security, has realized simultaneously The concentrated verification of completeness of platform.