Doc.: IEEE 802.11-00/419 Submission November 2000 David Halasz et alSlide 1 TGe Security Baseline David Halasz, Stuart Norman, Glen Zorn Cisco Systems,

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Windows 2000 Security --Kerberos COSC513 Project Sihua Xu June 13, 2014.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Doc.: IEEE /037 Submission March 2000 Duncan Kitchin, Jesse Walker, Intel NIDSlide 1 Proposal for Enhanced Encryption Duncan Kitchin Jesse Walker.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
security Courtesy of William Arbaugh with Univ. of Maryland Jesse Walker with Intel Gunter Schafer with TU Berlin Bernard Aboba with Microsoft.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Solutions for WEP Bracha Hod June 1, i Task Group  Addresses WEP issues –No forgery protection –No protection against replays –Attack through.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Demonstration of Wireless Insecurities Presented by: Jason Wylie, CISM, CISSP.
Introduction to Kerberos Kerberos and Domain Authentication.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Mobile and Wireless Communication Security By Jason Gratto.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
Wireless and Security CSCI 5857: Encoding and Encryption.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
Wireless Security Beyond WEP. Wireless Security Privacy Authorization (access control) Data Integrity (checksum, anti-tampering)
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
WEP Protocol Weaknesses and Vulnerabilities
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /293 Submission September 2000 Jesse Walker and Bob BeachSlide 1 The GSS-API as an Security Service Jesse Walker, Intel Corporation.
Doc.: IEEE /034r1 Submission March 2000 Dan Simon, Bernard Aboba, Tim Moore, Microsoft IEEE Security and 802.1X Dan Simon
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Wireless LAN Security. Security Basics Three basic tools – Hash function. SHA-1, SHA-2, MD5… – Block Cipher. AES, RC4,… – Public key / Private key. RSA.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Doc.: IEEE /035 Submission March 2000 Bernard Aboba, Tim Moore, MicrosoftSlide 1 IEEE 802.1X For Wireless LANs Bernard Aboba, Tim Moore, Microsoft.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Doc.: IEEE /562r1 Submission November 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /292 Submission September 2000 Bob Beach and Jesse WalkerSlide 1 An Overview of the GSS-API and Kerberos Bob Beach, Symbol Technologies.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Doc.: IEEE /322r0 Submission May 2002 Jesse Walker et alSlide 1 The Louie Architecture Nancy Cam Winget, Cisco Bob Moskowitz, TruSecure Greg Chesson,
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Port Based Network Access Control
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Robust Security Network (RSN) Service of IEEE
History and Implementation of the IEEE 802 Security Architecture
WEP2 Enhancements Russ Housley, RSA Labs Doug Whiting, HiFn
Some LB 62 Motions January 13, 2003 January 2004
802.1X and key interactions Tim Moore November 2001
PEKM (Post-EAP Key Management Protocol)
doc.: IEEE <doc#>
doc.: IEEE /454r0 Bob Beach Symbol Technologies
doc.: IEEE <doc#>
A Joint Proposal for Security
Presentation transcript:

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 1 TGe Security Baseline David Halasz, Stuart Norman, Glen Zorn Cisco Systems, Inc. Bernard Aboba, Tim Moore Microsoft Jesse Walker, Intel Bob Beach, Symbol Bob O’Hara, Informed Technology

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 2 Outline Introduction, Goals MAC Management Overview of 802.1X and EAP Packet exchanges Roaming Sample topologies Privacy Algorithms Proposed and 802.1X Summary

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 3 Introduction Represents merger of proposals 163, 362, and 382 Define MAC security negotiation mechanism Uses Kerberos V for authentication and fast handoff Uses 802.1X and EAP as authentication transport Addresses shortcomings of WEP/RC4 encryption Works with Kerberos KDC and (optionally) RADIUS authentication server

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 4 Goals Extensible system Authentication done at higher layer protocol Per-session key distribution Promote multi-vendor interoperability Minimize changes to IEEE , 802.1X Define mandatory authentication method Fast handoff Fix RC4 problems Ability to add new authentication methods easily (without changing )

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 5 Approach Based on existing protocols –Kerberos V (RFC 1510) –GSS-API (RFC 2743) –IAKERB (draft-ietf-cat-iakerb-05.txt) –EAP-GSS (draft-aboba-pppext-eapgss-02.txt) –802.1X/EAPOL –EAP (RFC 2284) enhancements –MAC security management –New model for authentication/association sequences –New privacy algorithm

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 6 MAC Security Management Provide means to register security algorithms –Open, Shared, Upper Layer Provide means to distribute security configuration information –e.g. principal name, realm, etc. Provide means to discover and select MAC level security options –e.g. privacy algorithm, message authentication

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 7 Registering Security Algorithms Provide means to register a new security algorithm with IEEE 802 and obtain unique identifier for it Three initial algorithms: –Current ones: Open and Shared –New one: Upper Layer Others can be added later

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 8 Advertising Security Options Modeled on “supported rates” AP advertises security options in probe response –Placed in probe response only if STA requests it in probe request STAs collect this information prior to associations and can make association and roaming decisions based upon it

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 9 Selecting security options STA requests security options in association request from available options contained in probe response AP accepts/rejects association based on request contents No additional protocol handshakes necessary –No impact on roaming performance

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide to 802.1X adaptation layer SupplicantAuthenticator Supplicant 1...N1...N One IEEE physical port becomes 1 to N virtual IEEE 802.1X ports. Map association IDs to the virtual ports

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 11 IEEE 802.1X Terminology Controlled port Uncontrolled port SupplicantAuthentication ServerAuthenticator Pieces of the system.

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 12 Normal Data Authentication traffic Wireless laptopAuthentication ServerAccess Point 802.1X trafficAuthentication traffic Wireless client associaton at layer: Data blocked by the AP Access Point blocks everything except 802.1X to authentication traffic. Authentication traffic is allowed to flow. Access point encapsulates 802.1X traffic into authentication server traffic and vice versa.

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 13 Normal Data Authentication traffic Wireless laptop Authentication ServerAccess Point 802.1X trafficAuthentication traffic Wireless client mutually authenticates with Authentication Server Access Point blocks everything except 802.1X to authentication traffic. In the authentication process the supplicant securely obtains a WEP key.

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 14 Normal Data Authentication traffic Wireless laptopAuthentication ServerAccess Point 802.1X trafficAuthentication traffic Wireless client and AP use WEP key, AP allows traffic to flow After successful EAP authentication, the Access Point allows all traffic to the Wireless laptop. The Wireless laptop sets the WEP keys through the MLME interface. (e.g. NIC driver)

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 15 EAP Framework EAP provides a flexible link layer security framework –Simple encapsulation protocol No dependency on IP ACK/NAK, no windowing No fragmentation support –Few link layer assumptions Can run over any link layer (PPP, 802, etc.) Does not assume physically secure link –Methods provide security services Assumes no re-ordering Can run over lossy or lossless media –Retransmission responsibility of authenticator (not needed for 802.1X or ) EAP methods based on IETF standards –Transport Level Security (TLS) (supported in Windows 2000) –GSS_API (including Kerberos)

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 16 EAP Architecture EAPLayer MethodLayer EAPEAP TLSTLS MediaLayer NDISAPIs EAPAPIs PPP IKEIKEGSS_APIGSS_API

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 17 EAP-GSS and IAKERB EAP-GSS (draft-aboba-pppext-eapgss-02.txt) –Use of GSS_API authentication methods within EAP –Typically will NOT use SPNEGO IAKerb (draft-ietf-cat-iakberb-05.txt) –GSS-API method enabling proxy Kerberos –STA not able to talk to KDC directly prior to authentication –Initial authentication IAKERB enables STA to obtain TGT, Ticket to AP –Handoff Ticket to AP

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 18 Initial Contact Associate EAP Identity Request EAP Identity Response EAP-GSS Request (Empty) EAP-GSS Response (IAKERB: AS_REQ) AS_REQ EAP-GSS Request (IAKERB: AS_REP)AS_REP EAP-GSS Response (IAKERB: TGS_REQ) TGS_REQ EAP-GSS Request (IAKERB: TGS_REP) TGS_REP EAP IAKERB Response (Empty) EAP-Success EAP-Key (AP_REQ) EAP-Key (AP_REP) STA AP KDC 802.1X is Unblocked is Unblocked Probe Request/Response

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 19 Operational Details Authentication method defaults to IAKERB –STA can attempt SPNEGO –AP can choose IAKERB if it doesn’t support anything else EAP-Key packets passed up and down via driver interface and SAP –On STA, GSS_API implementation needs to be able to generate AP_REQ, send it down to driver –On AP, need ability to validate received AP_REQ, force 802.1X controlled port into authorized state encryption turned on after AP_REQ/AP_REP exchange –AP turns on encryption after sending AP_REP –STA turns on encryption after receiving AP_REP –If EAP-Key exchange occurs prior to completion of 802.1X, then part of the 802.1X exchange may be encrypted!

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 20 Security Services Authentication of client to KDC (TGS_REQ) –PADATA typically NOT used with AS_REQ! Authentication of KDC to client (AS_REP, TGS_REP) Session key for client-AP communication (TGS_REP, AP_REQ) TGT, Session key for client-KDC communication (AS_REP) Authentication of client to AP (AP_REQ) Authentication of AP to client (AP_REP)

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 21 Roaming Within Realm Associate EAP Identity Request? EAP Identity Response? EAP-Success EAP-Key (AP_REQ) EAP-Key (AP_REP) STA AP KDC 802.1X is Unblocked is Unblocked Probe Request/Response

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 22 Roaming Issues How does the STA discover the AP realm, principal name? –Realm, Principal name placed in Probe Response if asked for by the STA How does the AP obtain the authorizations for the supplicant? –Can contact RADIUS server Adds an extra roundtrip No authorization-only message in RADIUS –Contact with backend server undesirable Kerberos tickets are reusable, don’t require KDC validation RADIUS server typically unable to validate the AP_REQ, since it won’t have access to the AP key Eliminating backend server contact reduces latency –Authorizations included in Authorization data of AP ticket Authorizations obtained by KDC from RADIUS server on initial contact and plumbed by the AP on ticket/authenticator validation

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 23 RADIUS Topology Authenticator (e.g. Access Point) Supplicant Enterprise Network Semi-Public Network / Enterprise Edge Authentication Server RADIUSRADIUS EAP Over Wireless (EAPOW) EAP Over RADIUS PAE PAE

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 24 Kerberos Topology Authenticator (e.g. Access Point) Supplicant Enterprise Network Semi-Public Network / Enterprise Edge Authentication Server KDCKDC EAP Over Wireless (EAPOW) EAP-GSS with IAKERB Kerberos PAE PAE

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 25 RADIUS with EAP-GSS Topology Authenticator (e.g. Access Point) Supplicant Enterprise Network Semi-Public Network / Enterprise Edge Authentication Server RADIUSRADIUS EAP Over Wireless (EAPOW) EAP-GSS with IAKERB EAP-GSS Over RADIUS PAE PAE KDCKDC

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 26 Broadcast Key Distribution Broadcast key(s) gets securely delivered to the station via IEEE 802.1X EAPOL-Key. –EAPOL-Key message encrypted using session key obtained in AP_REQ/AP_REP exchange Authentication server timer gets configured to re-authenticate/re-key the client.

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 27 Addressing WEP Limitations The problems with use of WEP Short Term fixes to WEP Using AES as new privacy algorithm

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 28 WEP Analysis The WEP encapsulation suffers from 3 major design flaws –IV too small (generic flaw) –Per-packet key construction by concatenating IV to key (generic flaw) –No weak-key avoidance (RC4 specific flaw) Together these problems render WEP privacy meaningless at any key size

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 29 Short term fix proposal Replace the too-small IV with a 128-bit IV –Goal is per-packet keys to avoid definition of an IV avoidance algorithm Compute per packet key in a new way –XOR IV with base key Compatible with existing RC4 hardware New packet format required

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 30 Short Term WEP Format Hdr 128-bit IV Data WEP ICV Hdr 128-bit IV EncryptDecrypt Data WEP ICV

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 31 Long term solution Use AES-128 as the new cryptographic primitive Use AES in Offset Codebook Mode OCB mode –128-bit session key –per packet 128-bit IV –algorithm provides both privacy and data integrity –avoid 2 passes over packet Add session sequence number to avoid replay Map base key to session key –use OCB mode tag to compute session key, to minimize number of cryptographic primitives implemented

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 32 Long Term WEP Format Hdr 128-bit IV Seq Num Data 128-bit MIC Seq Num Data Hdr 128-bit IV 128-bit MIC Encrypt Decrypt

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 33 Changes to 802.1X EAPOL-Key message used to carry AP_REQ/AP_REP exchange EAPOL-Key message needs to go from Supplicant (STA) to Authenticator (AP) –802.1XD8 spec only supports sending EAPOL- Key from Authenticator to Supplicant

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 34 Mapping to Requirements (1) Mutual authentication (4.1.1): satisfied by Kerberos V Accommodation with QoS (4.2.1): satisfied by Kerberos V Access control (4.2.2): GSS-API can be integrated into access control model Key derivation (4.4.1): satisfied by all GSS-API mechanisms Security service negotiations (4.5.1): satisfied by EAP or SPNEGO pseudo-mechanism Extensibility (4.5.2): extensibility via EAP or GSS-API

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 35 Mapping to Requirements (2) One mandatory-to-implement algorithm (4.5.3): Kerberos V only mandatory-to-implement security mechanism Scalability to all environments (4.6) –Mandatory to implement mechanisms support Enterprise, SoHo –PKINIT for ad hoc support Security framework must protect network traffic from eavesdropping: satisfied by RC4 Fixes/AES (4.3.1) Security framework must allow for authentication of the source of each packet: satisfied by AES with sequence number (4.3.3)

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 36 For Further Investigation Simulation of AES computational load Roaming authorizations EAP negotiation and support for additional authentication types Integration of 802.1X and state machines

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 37 Summary This proposal will promote multi-vendor interoperability by making authentication an upper layer function based on 802.1X Largely based on existing protocols with minor changes to Changes to 802.1X specification should be made to enable transmission of keys from STA to AP Changes to the IEEE specification should be made to allow for mixed WEP cells and for more secure WEP data packets.

doc.: IEEE /419 Submission November 2000 David Halasz et alSlide 38 For More Information AES – IEEE 802.1X – Kerberos/GSS-API – (Kerberos V) – (GSS-API) – RADIUS – – – – – – – – EAP – – –