EP3811587A1 - Procédé de modification de messages par un équipement sur un chemin de communication établi entre deux noeuds - Google Patents
Procédé de modification de messages par un équipement sur un chemin de communication établi entre deux noeudsInfo
- Publication number
- EP3811587A1 EP3811587A1 EP19742862.6A EP19742862A EP3811587A1 EP 3811587 A1 EP3811587 A1 EP 3811587A1 EP 19742862 A EP19742862 A EP 19742862A EP 3811587 A1 EP3811587 A1 EP 3811587A1
- Authority
- EP
- European Patent Office
- Prior art keywords
- node
- equipment
- data
- data message
- modification
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/04—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks
- H04L63/0428—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload
- H04L63/0471—Network architectures or network communication protocols for network security for providing a confidential data exchange among entities communicating through data packet networks wherein the data content is protected, e.g. by encrypting or encapsulating the payload applying encryption by an intermediary, e.g. receiving clear information at the intermediary and encrypting the received information at the intermediary before forwarding
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/06—Network architectures or network communication protocols for network security for supporting key management in a packet data network
- H04L63/062—Network architectures or network communication protocols for network security for supporting key management in a packet data network for key distribution, e.g. centrally by trusted party
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L2209/00—Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
- H04L2209/76—Proxy, i.e. using intermediary entity to perform cryptographic operations
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L63/00—Network architectures or network communication protocols for network security
- H04L63/02—Network architectures or network communication protocols for network security for separating internal from external traffic, e.g. firewalls
- H04L63/0281—Proxies
Definitions
- the invention is in the field of telecommunications infrastructure in which secure sessions are established on paths between end nodes and modified by so-called intermediate equipment.
- the communications established between two end nodes are increasingly encrypted, at least from the transport layer and up to the application layer in the TCP / IP model (in English Transmission Control Protocol / Internet Protocol).
- the lower layers are generally not encrypted to allow the routing of packets in the communication infrastructure.
- the QUIC protocol Quality UDP Internet Connections
- new transport protocol being standardized and described in the document IETF (draft-ietf-quic-transport-12) based on the UDP protocol (in English User Datagram Protocol)
- UDP protocol in English User Datagram Protocol
- This QUIC protocol natively integrates security functions, such as TLS functions, thus allowing communications based on this protocol to be secure without requiring an additional security protocol ,.
- the equipment deployed on the communication paths established between the end nodes, between which a communication path is established to transport the data of application sessions see their role reduced to the routing. messages and are no longer able to add or modify data to these messages.
- a transport protocol such as QUIC
- application protocols such as HTTP, SIP (in English Session Initiation Protocol), SMTP (in English Simple Mail Transfer Protocol ) cannot be read or modified by the equipment on the way.
- the equipment on the communication path would have to have all the keys used by the end nodes to encrypt and decrypt the message data, which is difficult to envisage, in particular because the equipment on the path are most often managed by administrative entities distinct from those managing the end nodes of the communication.
- the equipment present on the communication paths must intervene, in certain cases or for certain services, not only to route the messages but also to read, modify or add certain data to the messages.
- these devices carry out, for example, web optimization, requiring modifications at the application level, or else carry out filtering functions at the transport and / or application level, or else provide flow identification functions, requiring being able to read transport data as well as application data for messages.
- the object of the present invention is to remedy these drawbacks.
- the invention improves the situation using a method of modifying a data message sent by a first node to a second node on a path in a communication network, the second node having obtained a set of encryption variables originating from the first node, the method being intended to be executed by a device capable of intercepting the data message, the method comprising the following steps:
- the invention allows equipment placed on the communication path to be able to apply processing to data exchanged securely between nodes, such as a client and a server.
- nodes such as a client and a server.
- intermediate equipment that is to say on the communication path, can for example obtain an encryption parameter by configuring an encryption key, following an agreement recorded between the manager of the first node and the manager of the equipment.
- the encryption parameter can be a public encryption key and the encryption variable can be a private key associated with the public key.
- An encryption parameter is therefore relative to an encryption variable.
- the first node thus selects the devices on the way that can modify the data messages and provide them with an encryption parameter.
- a first device on the way by exploiting the encryption parameter, which is specific to it, to create a cryptographic element, prevents other devices on the way from reading or modifying the data that the first device will have modified.
- the modification of the data by an equipment has in fact been carried out using the cryptographic element resulting from the encryption parameter which only it can use, and only the second node, receiving the data messages transmitted by the first node and intercepted and modified. by the different devices authorized on the way, will be able to access the data modified by the different devices thanks to the encryption variables exchanged beforehand with the node sending the data.
- the intervention thus allows equipment on the way, duly authorized by the first node, to be able to modify the data transmitted by this first node.
- the encryption parameter is specific to a device because when several devices can intervene on a given path, it is important to be able to unambiguously identify the device that modified the data message.
- the use of encryption parameters, such as specific encryption keys per device, not only ensures confidentiality of the modifications made by a device vis-à-vis other devices but also enables the device having actually been identified changed the data.
- the encryption parameter is obtained in the data message received.
- the method avoids having to transmit an encryption parameter to the equipment beforehand and makes it possible to use the data messages for the purposes of transmitting the encryption parameters.
- the devices on the way use the different parameters present in the data message to determine their own cryptographic element.
- the modification method further comprises a step of deleting the encryption parameter in the data message sent to destination of the second node.
- the method can thus be implemented while preventing other equipment placed on the path from being able to fraudulently or accidentally modify the data already modified by other equipment located upstream from the path.
- Any equipment on a communication path can modify the data in a secure manner and without risking that this modified data be exploited by other equipment with the exception of the second node since the encryption parameter is removed by the equipment having exploited it. .
- the encryption parameter is included in the transport layer of a packet of the data message.
- Transport protocols are evolving and it is advantageous to take advantage of the free spaces provided in the recently specified and increasingly used transport protocols, such as for example the QUIC protocol.
- the advantage of using a transport protocol for transporting data messages that the equipment can modify is that it can be used for a wide variety of applications.
- the modification method further includes a step of adding the cryptographic element to the data message sent to the second node.
- the second node upon receipt of the data message, also obtains the cryptographic elements of the various devices on the path. This allows it to hold the encryption parameters and the cryptographic elements in order to be able to read the data modified by the intermediate equipment.
- the cryptographic element is determined from a random number present in the received data message.
- a node can send a message including random numbers that the different devices on the way can use.
- a device can advantageously use the random number received, encrypt it with a public key specific to the device, so that it can be identified and authenticated.
- the equipment modifying the data message can be authenticated.
- the cryptographic element is specific to the communication path.
- the cryptographic element determined by the equipment can be specific to the communication path so as to prevent equipment which has determined this element from being able to reuse it on another communication path, for the same communication or for a separate communication. The safety of the process is thus improved.
- the invention also relates to a method for controlling modification of a data message sent by a first node to a second node on a communication path between the two nodes, the modification being carried out by equipment capable of intercepting the data message, the method being intended to be executed by the first node and comprising the following steps:
- the control process is initialized when the communication is established, and thus has the advantage of being able to be implemented for all of the data messages exchanged between the nodes.
- Data messages are application type messages, for example HTTP, SMTP (in English Simple Mail Transfer Protocol), RTSP (in English Real Time Streaming Protocol) messages or even DNS control messages (in English Domain Name System) ), ICMP (in English Internet Control Message Protocol), SIP (in English Session Initiation Protocol).
- the encryption variables are transmitted to the second node so that it is able to decrypt the data modified by the devices on the communication path. Thus, only the nodes have access to the different information modified by the equipment located on the path.
- the method allows equipment, duly authorized by the encryption parameter received, to modify data in a secure manner since the encryption parameter is specifically assigned to it.
- the encryption parameter is a public encryption key and the cryptographic element is a random number encrypted using the public encryption key.
- the device receives a random number in the data message and encrypts it using a distributed public key.
- the invention also relates to a device for modifying a data message sent by a first node to a second node on a communication path established between the two nodes, the second node having previously obtained a set of variables of encryption from the first node, the device comprising:
- An interception module capable of intercepting the data message, coming from the first node and bound for the second node
- a obtaining module capable of obtaining an encryption parameter, relating to a variable of the set, coming from the first node
- a determination module capable of determining a cryptographic element from the parameter obtained
- a modification module capable of modifying at least one datum of the message from the determined cryptographic element
- a transmitter capable of transmitting the modified data message to the second node.
- This device is capable of implementing in all of its embodiments the modification method which has just been described.
- the invention also relates to a device for controlling the modification of a data message sent by a first node to a second node on a communication path between the two nodes, the modification being executed by a device, capable of intercepting the data message, the device comprising:
- a receiver capable of receiving a message requesting the establishment of the communication path from the second node
- a generation module capable of generating a set of encryption variables
- a transmitter capable of transmitting an establishment response message comprising the set of encryption variables intended for the second node
- a delivery module capable of delivering an encryption parameter, relating to a parameter of the assembly, intended for the equipment
- a transmitter capable of transmitting a data message to the second node.
- This device is capable of implementing in all of its embodiments the control method which has just been described.
- the invention also relates to a system for modifying a data message sent by a first node to a second node, the modification being carried out by equipment on at least one communication path between the two nodes, the system comprising :
- a first node comprising a device for controlling modification of the data message, such as that which has just been described,
- a second node comprising:
- a transmitter capable of transmitting a message for requesting the establishment of a communication path to the first node
- - A receiver capable of receiving an establishment response message comprising the set of encryption variables originating from the first node, and capable of receiving the data message originating from the first node.
- the invention also relates to a computer program comprising instructions for implementing the steps of the modification method which has just been described, when this program is executed by a processor, as well as to a computer program comprising instructions for implementing the steps of the control method which has just been described, when this program is executed by a processor.
- the invention also relates to an information medium readable by equipment capable of transmitting, intercepting or receiving a data message, and comprising instructions from one or the other of the computer programs as mentioned above.
- the programs mentioned above can use any programming language, and be in the form of source code, object code, or intermediate code between source code and object code, such as in a partially compiled form, or in n any other desirable form.
- a support may include a storage means, such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or also a magnetic recording means.
- a storage means such as a ROM, for example a CD ROM or a microelectronic circuit ROM, or also a magnetic recording means.
- Such storage means can for example be a hard disk, a flash memory, etc.
- an information medium can be a transmissible medium such as an electrical or optical signal, which can be routed via an electrical or optical cable, by radio or by other means.
- a program according to the invention can in particular be downloaded from a network of the Internet type.
- an information medium can be an integrated circuit in which a program is incorporated, the circuit being adapted to execute or to be used in the execution of the processes in question. 4. Presentation of the figures
- FIG. 1 shows a simplified view of a communication network in which the modification process is implemented
- FIG. 2 presents the modification method according to a first embodiment of the invention
- FIG. 3 presents the modification method in a communication network according to a second embodiment of the invention
- FIG. 4 shows the modification method in a communication network according to a third embodiment of the invention
- FIG. 5 shows an example of the structure of a modification device, according to one aspect of the invention
- FIG. 6 shows an example of the structure of a modification control device, according to one aspect of the invention.
- the communication network can either be a fixed type communication network or a mobile / wireless type communication network.
- the network can also be a hybrid network integrating a wired part and a wireless part.
- FIG. 1 presents a simplified view of a communication network in which the modification method is implemented according to one aspect of the invention.
- Two nodes 10 and 50 which may for example be mobile terminals such as smartphones or fixed terminals such as residential gateways or any equipment equipped with communication means, are attached to a communication network 1.
- Other nodes 20, 30, 40 which can be HTTP servers, DNS servers (in English Domain Name Server), FTP servers (in English File Transfer Protocol) or even nodes of the same type as the nodes 10 and 50, are also attached to the communication network 1.
- the communication network 1 allows the nodes 10, 50 on the one hand and 20, 30, 40 on the other hand to be able to exchange data, for example by establishing application sessions between the nodes.
- the communication network 1 comprises communication paths C1, C2, C3, C4. These paths include devices which carry data from nodes and links, wired or non-wired, interconnecting the devices.
- the path between a node and another node can be selected according to quality of service criteria, management criteria, characteristics specific to the end nodes or application constraints.
- the operator of network 1 can implement routing policies to route data from the different nodes attached to network 1.
- path C1 routes data from node 10 to node 20 and includes the equipment 13, 1 1, 12.
- the path C3 routes the data from the node 10 to the node 40 and comprises the devices 15 and 16.
- Path C4 routes data from node 50 to node 40 and includes equipment 15 and 14.
- a path can route data sent by separate nodes to nodes which may also be separate. The path is then shared for several data sessions.
- a single session can also use several paths.
- the node 10 could send data to node 20 using several paths, for example to make data transfer more reliable or to benefit from more transmission capacities.
- a path can be unidirectional or bidirectional.
- the data from node 10 to node 30 is routed via a path different from the data sent by node 30 to node 10.
- the data follows the same path regardless of the transmitter or receiver of the data.
- the data of a bidirectional path may have to be processed by the same devices on the path, but a device can, in certain cases, only modify the data transmitted in a given direction.
- a bidirectional path is said to be symmetrical if the same equipment intervenes in both directions.
- the equipment 1 1, 12, 13, 14, 15, 16 of the paths C1, C2, C3, c4 have routing capacities but they also have processing capacities. They can thus modify the messages transmitted by the nodes either by extracting data, or by adding data, or by changing data, all these operations consisting in modifying the data transmitted by the nodes. Data modification or extraction is possible if this data is not encrypted in the message. For example, these nodes can perform operations to optimize HTTP functions (in English Hypertext Transfer Protocol), address translation, data filtering, legal interception, data security, etc.
- HTTP functions in English Hypertext Transfer Protocol
- the node 10 which is considered to be a terminal in this embodiment, establishes an application session with the node 20, which is considered to be an HTTP server.
- the data from the application session is transmitted on path C5.
- the data is sent from the terminal 10 to the server 20 and is processed by the three devices M1 13, M2 14 and M3 15 located on the path C5.
- the equipment is said to be intermediate, because it is located between the two nodes 10 and 20, called end points, on path C5.
- Equipment M1, M2, M3 must be able to intervene on the data transmitted if nodes 10 and 20 authorize it to do so.
- the equipment M1 adds quality of service information, while the equipment M2 extracts information from the data for legal purposes and the equipment M3 replaces information with the data for example to mask information at the destination node 20.
- the number of devices on the path is not limited and the devices can be managed by a single or separate entity.
- the terminal 10 transmits a packet P1 to the server 20.
- This packet includes a header, including information making it possible to route the packet on the path C5 and other information, for example of quality of service, as well as information say useful corresponding to the application data.
- This is for example an HTTP request.
- a DMZ field is present so that it can be used by the intermediate equipment on path C5.
- This DMZ field is an exchange area that the intermediate equipment uses to modify certain packet data.
- the DMZ field can for example be a padding field (or “padding” in English) of packets used for the purposes of the modification process. It can also be a field of a transport protocol or an application protocol.
- the M1 equipment intercepts the P1 packet and uses part of the DMZ field to add information relating to the quality of service.
- the equipment uses an M1 Info field, which may or may not be assigned to it.
- the DMZ field can include fields specifically allocated to the equipment on the way, or a single field that each intermediate equipment can use according to its needs.
- the information M1 Info is encrypted using an encryption key specific to the equipment M1, obtained beforehand, from the terminal 10 or from the server 20 so that other equipment on the path C5 cannot read or modify the modified data of M1.
- the M2 equipment intercepts the P1 packet but does not make any modification, either because it is not authorized to modify by the end nodes, or because the packet does not carry information which it must modify .
- Equipment can be authorized or not to modify the packet P1 using a key allowing it to modify the packet for example, this key being transmitted to it independently in this embodiment.
- the equipment M2 can modify the encrypted packet data only if it has a decryption key allowing it to be able to access the encrypted data of the packet P1 using a key corresponding to the encryption key used to encrypt the data.
- the terminal can thus encrypt certain data with a key and other data with another key.
- the equipment M2 transmits the packet P1 to the server 20.
- the M3 equipment intercepts the P1 packet and also modifies information from the P1 packet. For example, it substitutes information from the packet P1 to mask the information relating to the terminal 10. This can in particular be useful if the packet transits to a network managed by an entity different from that which manages the equipment M3 to reach the server 20.
- the equipment 20 therefore modifies the packet P1 and indicates it in an unused part of the DMZ field.
- the M1 info data encrypted by the M1 equipment is not accessible either to the M2 equipment or to the M3 equipment.
- the M3 equipment can add M3 Info information in the DMZ field and it encrypts this information with its own encryption key. It can encrypt the only information it has added or all of the information M1 info and M3 info. In this case, the M1 info data is encrypted by the M1 equipment and then by the M3 equipment while the data added by the M3 equipment is only encrypted by the M3 equipment.
- the packet P1 comprising the fields M1 info and M3 info, respectively encrypted by the equipment M1 and M3, is then sent to the server 20.
- the server 20, having encryption variables, which in this case are encryption keys used by equipment 13 and 15 can access data M1 info and M3 info.
- the server 20 has in fact obtained from the terminal 10 the keys used by the equipment 13 and 15 for the session between the terminal 10 and the server 20. These keys are for example transmitted by the server 20 to the equipment during the establishment of the session, providing change control to the server 20.
- the server 20 can also check the packet P1 received in order to check the modifications made by the equipment on the way. In particular, the server 20 can identify if data has been modified using keys that it does not hold or if modifications have been made to the packet P1 by different equipment using the same key. In the case where the server 20 detects that a modification has been made without authorization, it can decide to delete the packet, transmit a message to the terminal 10 to interrupt the transmission of data for example.
- FIG. 3 presents an overview of the modification method according to a second embodiment of the invention.
- Entities 10, 13, 14, 15 and 20 correspond to the identically numbered entities in Figure 2.
- the protocol used in this embodiment is the QUIC protocol.
- Another protocol, such as TLS could also be used.
- step E1 the terminal 10 transmits a “HELLO client” message for establishing session to the server 20.
- step E2 the server 20 determines a set of encryption variables.
- these are private encryption keys a ’, b’, c ’, d’ and the public encryption keys a, b, c, d corresponding to the private keys.
- the server can thus generate as many keys as necessary according to its own means, for example from a computer. It is also possible to generate keys during a session to increase security, which requires that the generated keys are then transmitted to the terminal 10.
- step E3 the server 20 sends to the client 10 a message of the “HELLO server” type comprising the private keys a ', b', c ', d' determined during step E2.
- the messages "HELLO client” and “HELLO server” transmitted during the respective steps E1 and E3 are encrypted so that they can only be read by the terminal 10 and the server 20. They could also be secret keys, which require prior exchanges between the server 20 and the terminal 10.
- step E4 the terminal 10 stores the encryption keys received so that it can subsequently decrypt the data messages from the server 20.
- step E5 the terminal 10 sends a request for obtaining content to the server 20.
- the request for obtaining the content can be for example an HTTP request.
- the step E6 corresponds to the sending of HTTP data by the server 20 to the terminal 10 following the reception of the request during the step E5.
- the data message further comprises the encryption parameters relating to the variables a ’, b’, c ’, d’.
- these are public keys a, b, c, d determined by the server 20 during step E2.
- the keys are preferably transmitted in clear, that is to say unencrypted so that the equipment on the way can use them without requiring additional keys.
- the message comprising the data originating from the server 20 is intercepted by the equipment 15.
- the equipment 15 extracts a first public key, for example the public key a.
- the equipment 15 adds data in a message field, for example in the padding field of the transport protocol. It may be information indicating that data of the message has been modified or else data specific to the equipment 15 to be transmitted to the terminal 10. Once the data has been modified, it encrypts the field in which it has added the modified data using the public key a and it extracts this key a from the message to be sent to the terminal 10. Thus, another device cannot reuse the key a to access the data modified by the device 15 or to make modifications with this key since the key a is no longer present in the modified message sent by the equipment 15. A key can therefore only be used by an equipment.
- the equipment 13 in turn intercepts the data message, comprising only the public keys b, c, d, initially issued by the server 20 and routed via the equipment 15.
- the equipment 13 performs operations comparable to the operations performed by the equipment 15, by modifying the data of the message received but by encrypting the modified data using the public encryption key b and by removing it from the message to be sent to the terminal 10.
- the equipment 13, according to an alternative, encrypts with the key b only the data that it has added or else, according to another alternative, the data added by the equipment 15 and encrypted with key a, in addition to its data. In the latter alternative, the data added by the equipment 15 is encrypted with the key a and then with the key b while the data added by the equipment 13 is only encrypted with the key b.
- the message is then sent to the terminal which receives it during step E9.
- the message includes the data sent by the server 20, which have been modified by the equipment 15 and 13, and whose data added by the equipment 15 and 13 are respectively encrypted with the public keys a and b.
- the message received by the terminal 10 also includes the public keys c and d which have not been used by any equipment on the way.
- the terminal 10, holding the private keys a 'and b' memorized during step E4, is able to decrypt the information modified by the equipment 15 and 13. It suffices to use the private key corresponding to the last key public not present in the message received to decrypt the last modified part.
- the terminal 10 accesses the modification of the equipment 13 as well as the modification of the encrypted equipment 15. Then, using the private key a ’, the terminal 10 can decrypt the part modified by the equipment 15. Thus, only the terminal 10, can access all of the data modified by the equipment 13 and 15.
- step E10 the terminal 10 sends an HTTP request message to the server, for example to obtain other content following the data retrieved during step E9.
- steps E10 to E13 include the transmission of the message by the terminal 10, the modification of this message by the equipment 13 then 14 and the reception by the server 20. It should be noted that the equipment involved in the steps E7 and E8 on the one hand and E1 1 and E12 on the other hand are not the same, which may be the case when the paths are non-symmetrical.
- FIG. 4 presents an overview of the modification method according to a third embodiment of the invention.
- step E ⁇ the terminal 10 sends a session establishment message to the server 20.
- This can be a SYN type message if it is a TCP session (in English Transport Control Protocol) .
- step E’2 the server 20 determines random numbers x, y, z also called nonces.
- the keys in the second embodiment it is possible to envisage the determination of different nonces during a session between the server 20 and the terminal 10, in particular to increase the security of the data exchanged during the session.
- step E'3 the server 20 transmits to the terminal 10 the determined nonces x, y, z as well as the encryption variables, the private encryption keys K ⁇ , K'2, K'3 corresponding to the encryption parameters that are the public keys K1, K2, K3 transmitted to the devices 15, 14, 13.
- step E’4 the terminal stores the nonces x, y, z received and the private keys K ⁇ , K’2, K’3 received during step E’3.
- step E’5 the terminal 10 sends a request to the server 20 to obtain content, for example by transmitting a request of HTTPGET type.
- the terminal sends the HTTP GET type data message to the server 20 during step E'5, the data message further comprising nonces x, y, z.
- the equipment 13 intercepts the data message during step E’6 and extracts the nonce x. From the public key K3 transmitted by the server 20 during step E ’" 0, the equipment 13 calculates an encrypted nonce x ’from the nonce x using the key K3.
- the equipment 13 digits, using the key K3, the data which it must add to the data message according to the function which it fulfills. It can for example add an address of a PCRF server (in English Policy Rules and Control Function) to which the billing data must be sent. It encrypts this IP address using the public key K3.
- the equipment also modifies the data message by replacing the nonce x of the received data message with the encrypted nonce x.
- the modified message to be sent to the server 20 includes data modified using the key K3, the nonce has been encrypted with the key K3 and no longer understands the nonce a.
- the data message is intercepted during step E'7 by the equipment 14 which also intervenes on the message by modifying the message by adding information, for example by indicating the identity of the manager of this equipment 14.
- the equipment encrypts the identity to be added with the public key K2 received during step E ”0.
- the equipment 14 encrypts the nonce y with the public key K2 and obtains an encrypted nonce y ’.
- the equipment 14 modifies the data message by adding the identity of the encrypted manager and by replacing the nonce y received with the encrypted nonce y ’.
- the data message modified by the equipment 13 then by the equipment 14 is transmitted to the server 20 which it receives during step E’8.
- the server 20 having the private keys K'3 and K'2 can decrypt the data modified by the equipment 13 and 14 on the way and it can also identify which equipment has modified the said data from the encrypted nonces x 'and y' received. Knowing that he can only obtain the nonce x from the key K’3, he can identify that the device 13 has encrypted the message data with the key K3.
- the data sent by the server 20 to the terminal 10 during step E'9, following the request sent by the terminal 10, are intercepted by the same equipment 13 and 14 during steps E ⁇ 0 and E ⁇ 1 since it is considered that the path used for the transmission of the data is bidirectional and symmetrical.
- the terminal receives the data during step E ⁇ 2 and can decrypt the data modified by the equipment 13 and 14 because it has information on the nonces x, y, z and the private keys K ⁇ , K'2, K'3 .
- This embodiment has the advantage of being able to identify the equipment which has modified data of a message for a message transmitted on a path and, moreover, it makes it possible to avoid transmitting the encryption keys in the data message.
- the modification device 100 implements the modification method, various embodiments of which have just been described.
- Such a device 100 can be implemented in any type of equipment present on a communication path, whether this equipment is virtualized or not.
- This can be a mobile network gateway, equipment responsible for translating IP addresses, a firewall, equipment providing DPI functions (in English Deep Packet Inspection), etc.
- the device 100 comprises a processing unit 106, equipped for example with an mR microprocessor, and controlled by a computer program 105, stored in a memory 107 and implementing the selection method according to the invention.
- a computer program 105 stored in a memory 107 and implementing the selection method according to the invention.
- the code instructions of the computer program 105 are for example loaded into a RAM memory, before being executed by the processor of the processing unit 106.
- Such a device 100 includes:
- An interception module 101 capable of intercepting the data message, coming from the first node and bound for the second node,
- a module 102 for obtaining capable of obtaining an encryption parameter for the assembly from the first node
- a determination module 103 capable of determining a cryptographic element from the parameter obtained
- a modification module 104 capable of modifying at least one datum of the message from the determined cryptographic element
- a transmitter 1 10 capable of transmitting the modified data mess message to the second node.
- the modification control device 200 can be implemented in equipment of the fixed or mobile terminal type, residential gateway or any type of server.
- the node 200 comprises a processing unit 206, equipped for example with a microprocessor mR, and controlled by a computer program 205, stored in a memory 207 and implementing the selection method according to the invention.
- a computer program 205 stored in a memory 207 and implementing the selection method according to the invention.
- the code instructions of the computer program 205 are for example loaded into a RAM memory, before being executed by the processor of the processing unit 206.
- Such a device 200 comprises:
- a receiver 220 capable of receiving a Req message requesting the establishment of the communication path from the second node
- a generation module 201 capable of generating a set of encryption parameters
- a transmitter 210 A transmitter 210,
- a delivery module 202 capable of delivering an encryption parameter, relating to a variable of the set, to the equipment.
- the modules described in connection with FIG. 5 and FIG. 6 can be hardware or software modules.
- the modification method and the modification control method makes it possible to be able to authorize so-called intermediate equipment, present on an access network or in a core network, for example on a Wi-Fi infrastructure or a GPRS / LTE / 5G network to modify data.
- a client or a server may or may not allow intermediate equipment to modify data, in particular by adding information to the data transmitted by the client or the server.
- the methods also make it possible to know which intermediate equipment has added which data to the message.
- the methods allow the use of transport or application protocols to emit encryption parameters if necessary, knowing that the use of transport protocol such as QUIC, which is rapidly increasing in use in networks, is an appropriate choice. to develop the use of processes.
- the methods do not call into question the security of the data since it is possible to use unencrypted fields to transport the encryption parameters and to keep an encryption of the other data transmitted by the terminal or the server that the equipment must not not change. It is also possible to encrypt certain data of a message with a key and other data of the message with other keys so as to make accessible to equipment only certain parts of the messages and also to prevent only modifications made by one device can be read or modified by another device on the data path.
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Computer Hardware Design (AREA)
- Computing Systems (AREA)
- General Engineering & Computer Science (AREA)
- Computer Networks & Wireless Communication (AREA)
- Signal Processing (AREA)
- Data Exchanges In Wide-Area Networks (AREA)
- Mobile Radio Communication Systems (AREA)
Abstract
Description
Claims
Applications Claiming Priority (2)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
FR1855681A FR3081653A1 (fr) | 2018-06-25 | 2018-06-25 | Procede de modification de messages par un equipement sur un chemin de communication etabli entre deux noeuds |
PCT/FR2019/051440 WO2020002793A1 (fr) | 2018-06-25 | 2019-06-14 | Procédé de modification de messages par un équipement sur un chemin de communication établi entre deux nœuds |
Publications (1)
Publication Number | Publication Date |
---|---|
EP3811587A1 true EP3811587A1 (fr) | 2021-04-28 |
Family
ID=63963135
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
EP19742862.6A Pending EP3811587A1 (fr) | 2018-06-25 | 2019-06-14 | Procédé de modification de messages par un équipement sur un chemin de communication établi entre deux noeuds |
Country Status (4)
Country | Link |
---|---|
US (1) | US11936634B2 (fr) |
EP (1) | EP3811587A1 (fr) |
FR (1) | FR3081653A1 (fr) |
WO (1) | WO2020002793A1 (fr) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
FR3111252A1 (fr) * | 2020-06-04 | 2021-12-10 | Orange | Procédé de capture d’un paquet d’une session chiffrée |
Family Cites Families (9)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7188180B2 (en) * | 1998-10-30 | 2007-03-06 | Vimetx, Inc. | Method for establishing secure communication link between computers of virtual private network |
US8510846B1 (en) * | 2006-06-29 | 2013-08-13 | Google Inc. | Data encryption and isolation |
US7865717B2 (en) * | 2006-07-18 | 2011-01-04 | Motorola, Inc. | Method and apparatus for dynamic, seamless security in communication protocols |
US8700894B2 (en) * | 2007-10-17 | 2014-04-15 | Pitney Bowes Inc. | Method and system for securing routing information of a communication using identity-based encryption scheme |
US9349018B1 (en) * | 2012-07-19 | 2016-05-24 | Mobile Iron, Inc. | Preventing content data leak on mobile devices |
US9571471B1 (en) * | 2015-11-10 | 2017-02-14 | AO Kaspersky Lab | System and method of encrypted transmission of web pages |
US10116634B2 (en) * | 2016-06-28 | 2018-10-30 | A10 Networks, Inc. | Intercepting secure session upon receipt of untrusted certificate |
WO2018076183A1 (fr) * | 2016-10-25 | 2018-05-03 | 华为技术有限公司 | Procédé, appareil, et système de transmission de données |
US20180176187A1 (en) * | 2016-12-16 | 2018-06-21 | Amazon Technologies, Inc. | Secure data ingestion for sensitive data across networks |
-
2018
- 2018-06-25 FR FR1855681A patent/FR3081653A1/fr not_active Withdrawn
-
2019
- 2019-06-14 US US17/255,088 patent/US11936634B2/en active Active
- 2019-06-14 EP EP19742862.6A patent/EP3811587A1/fr active Pending
- 2019-06-14 WO PCT/FR2019/051440 patent/WO2020002793A1/fr unknown
Also Published As
Publication number | Publication date |
---|---|
FR3081653A1 (fr) | 2019-11-29 |
US20210273926A1 (en) | 2021-09-02 |
US11936634B2 (en) | 2024-03-19 |
WO2020002793A1 (fr) | 2020-01-02 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US11848961B2 (en) | HTTPS request enrichment | |
EP3646557A1 (fr) | Procédé de communication quic via des chemins multiples | |
FR3053197A1 (fr) | Procede de communication udp via des chemins multiples entre deux terminaux | |
EP2359546B1 (fr) | Procede de configuration de parametres de gestion de paquets de donnees appartenant a un flux de donnees | |
EP3613186B1 (fr) | Système et procédé de communications | |
EP3643044B1 (fr) | Procédé d'activation de traitements appliqués à une session de données | |
EP3695571B1 (fr) | Dispositif et procédé de transmission de données | |
WO2020260813A1 (fr) | Procédé de gestion d'une communication entre terminaux dans un réseau de communication, et dispositifs pour la mise en oeuvre du procédé | |
WO2020002793A1 (fr) | Procédé de modification de messages par un équipement sur un chemin de communication établi entre deux nœuds | |
EP4222994A1 (fr) | Procedes de configuration d'un equipement utilisateur, de negociation avec une entite du reseau, et de gestion d'une connexion, et dispositifs associes | |
US20220201090A1 (en) | Over-the-top management in a communication network | |
WO2016097534A1 (fr) | Procédé d'échanges de données entre deux navigateurs internet, équipement de routage, terminal, programme d'ordinateur et support d'informations corespondants | |
EP3949287A1 (fr) | Passerelle et procédé de différentiation de trafic émis par la passerelle, dispositif et procédé gestion du trafic | |
FR3080967A1 (fr) | Procede d'envoi d'une information et de reception d'une information pour la gestion de reputation d'une ressource ip | |
WO2023083771A1 (fr) | Procédés de contrôle, de vérification et de configuration, et entités configurées pour mettre en œuvre ces procédés | |
EP2146534B1 (fr) | Authentification d'un terminal | |
EP4033794A1 (fr) | Procédé d'attribution dynamique d'identifiants à une carte de circuit intégré universelle embarquée - euicc d'un équipement utilisateur et système associé | |
EP3970318A1 (fr) | Gestion de services de transmission libre dans un réseau de communication | |
EP1858224A1 (fr) | Méthode de mise en place des réseaux privés virtuels et contrôle d'accès distant | |
FR2965132A1 (fr) | Procede de configuration de parametres de gestion de paquets de donnees appartenant a un flux de donnees |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: UNKNOWN |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: THE INTERNATIONAL PUBLICATION HAS BEEN MADE |
|
PUAI | Public reference made under article 153(3) epc to a published international application that has entered the european phase |
Free format text: ORIGINAL CODE: 0009012 |
|
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: REQUEST FOR EXAMINATION WAS MADE |
|
17P | Request for examination filed |
Effective date: 20210118 |
|
AK | Designated contracting states |
Kind code of ref document: A1 Designated state(s): AL AT BE BG CH CY CZ DE DK EE ES FI FR GB GR HR HU IE IS IT LI LT LU LV MC MK MT NL NO PL PT RO RS SE SI SK SM TR |
|
AX | Request for extension of the european patent |
Extension state: BA ME |
|
RAP3 | Party data changed (applicant data changed or rights of an application transferred) |
Owner name: ORANGE |
|
DAV | Request for validation of the european patent (deleted) | ||
DAX | Request for extension of the european patent (deleted) | ||
STAA | Information on the status of an ep patent application or granted ep patent |
Free format text: STATUS: EXAMINATION IS IN PROGRESS |
|
17Q | First examination report despatched |
Effective date: 20230313 |