Protocol Coexistence Issue in MSA Subsequent Authentication

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /0114r1 Submission January 2009 Tony Braskich, MotorolaSlide 1 A vendor specific plan for centralized security Date: Authors:
Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /0165r1 SubmissionPäivi Ruuska, NokiaSlide 1 Implementation aspects of a coexistence system Notice: This document has been.
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.: IEEE r6 Submission July 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Doc.: IEEE /0283r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 Suggested Changes to the Abbreviated Handshake Date: Authors:
H. 323 Chapter 4.
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
Implementing A Simple Storage Case Consider a simple case for distributed storage – I want to back up files from machine A on machine B Avoids many tricky.
The SMART Way to Migrate Replicated Stateful Services Jacob R. Lorch, Atul Adya, Bill Bolosky, Ronnie Chaiken, John Douceur, Jon Howell Microsoft Research.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Submission doc.: IEEE 11-12/0589r2 July 2012 Donald Eastlake 3rd, Huawei R&D USASlide 1 General Links Date: Authors:
Security Protocols and E-commerce University of Palestine Eng. Wisam Zaqoot April 2010 ITSS 4201 Internet Insurance and Information Hiding.
Doc.: IEEE /0115r1 Submission July 2012 Mika Kasslin, NokiaSlide 1 Design Principles for Entity Responsibilities Notice: This document has been.
Remote Procedure Calls Adam Smith, Rodrigo Groppa, and Peter Tonner.
Doc.: IEEE /0476r3 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
Presented by: Suparita Parakarn Kinzang Wangdi Research Report Presentation Computer Network Security.
Doc.: IEEE /0358r0 Submission March 2007 Zhao and Walker, Intel CorpSlide 1 Thoughts on Peer Capacity Date: Authors: Notice: This document.
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Doc.: IEEE /1062r0 Submission September 2004 F. Bersani, France Telecom R&DSlide 1 Dominos, bonds and watches: discussion of some security requirements.
Doc.: IEEE /1063r0 Submission Nov 2005 Jon Edney, NokiaSlide 1 The Lock-out Problem - an Analysis Notice: This document has been prepared to assist.
Thoughts on KeySec John Viega
Kireeti Kompella draft-kompella-mpls-rmr-01
Doc.: IEEE /0782r2 Submission Proposed Resolution to CID 120 Slide 1 July 2014 Qian Chen.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /0232r0 Submission February 2009 Meiyuan Zhao, IntelSlide 1 Suggestions to Clean Up Peering Management Frames Date:
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
Doc.: IEEE r1 Submission March 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
Doc.: IEEE /2176r0 Submission July 2007 Meiyuan Zhao, Intel Corp.Slide 1 Protocol Analysis of Abbreviated Handshake Date: Authors:
Thoughts on the LMAP protocol(s) LMAP Interim meeting, Dublin, 15 th September 2014 Philip Eardley Al Morton Jason Weil 1.
Doc.: IEEE /2539r0 Submission September 2007 Tony Braskich, MotorolaSlide 1 Overview of an abbreviated handshake with sequential and simultaneous.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Doc.: IEEE /1353r0 Submission September 2006 J. Walker, M. Zhao, and S. Conner (Intel) Slide 1 Summary of Security and Link Establishment Protocols.
Doc.: IEEE /2952r2 Submission Dec 2007 L.Chu Etc.Slide 1 Simplified DLS Action Frame Transmission in 11Z Date: Authors:
Relationship between peer link and physical link
FILS Reduced Neighbor Report
Discussions on FILS Authentication
Chapter 6: Transport Layer (Part I)
Updates on Abbreviated Handshake
Overview of Key Holder Security Association Teardown Mechanism
Improvements to Power Management
Improvements to Power Management and Future Work
FILS Reduced Neighbor Report
Key Distribution for Mesh Link Security
Summary of Updates to Abbreviated Handshake
May 2007 MSA Comment Resolution Overview
Changes to SAE State Machine
Authentication and Key Management of MP with multiple radios
Simulation Evaluation of Peer Link Management Protocol
Updates on Abbreviated Handshake
Mesh Security Proposal
Different MKD domain MPs communication method
Overview of Abbreviated Handshake Protocol
The SMART Way to Migrate Replicated Stateful Services
Relationship between peer link and physical link
Overview of Improvements to Key Holder Protocols
PLE Comment Resolution Update
MSA Key Hierarchy Analysis and Alternatives
Overview of Improvements to Key Holder Protocols
Congestion Control Comments Resolution
Overview of an MSA Security Proof
Presentation transcript:

Protocol Coexistence Issue in MSA Subsequent Authentication 2008-05-11 Authors:

Abstract This presentation analyzes two protocol operational issues in MSA subsequent authentication procedure: The interaction with the Key Transport Protocol is complex Supporting both AbbrHS and “PLM4WHS” for subsequent authentication increases non-interoperetability and deployment complexity and suggests using only the Abbreviated Handshake for subsequent handshake to address these issues

MSA Subsequent Authentication Peer Link Establishment Key Transport Key Transport Abbreviated Security Handshake MSA 4-Way Handshake

Issue 1: Interaction of Handshakes and Key Transport The interaction of the key transport protocol with the handshake protocols is complex Current design does not appear to be robust

Executing Key Transport Protocol PLE  Key Transport  MSA 4-Way Handshake A stop-and-wait protocol, with the attendant performance issues PLE negotiates  1 PMKs for the later MSA 4-Way Handshake If the chosen PMK is not cached locally, one MP executes the key transport protocol to fetch the key from its MKD MSA 4WHS is initiated if the MP successfully fetches the selected PMK

Operational Issues Peer MP reaches the MKD via a multi-hop path through the mesh This is an unreliable path The MP can’t assume its peer MP can fetch the key successfully in time An MP’s announcement that it maintains a security association with MKD, such announcement does not imply that the peer MP can communicate with MKD at the moment needed Requiring one MP to wait on the other to execute key transport protocol is not a robust design A single failure stalls the entire procedure

Suggested Changes to Invoke Key Transport Protocol If “PLE  4WHS” (more details in backup) Use PMK selection procedure to select a PMK both MPs have cached locally If such a PMK does not exist, BOTH MPs (if they have MKDSA) shall execute key transport protocol to fetch the peer’s PMK Note this step can happen as soon as an MP realizes there’s a need Not necessarily to wait until PLE completes When the MP fetches the key, initiate an MSA 4-way handshake If “Abbreviated Handshake” Select the PMK using the AbrevHS key negotiation procedure If fail, BOTH MPs may execute the key transport protocol When one of the MP completes, initiate a new AbbrHS instance

Issue 2: How to Select MSA 4WHS or AbbrevHS? One MP chooses to use the MSA 4-Way Handshake for MSA Subsequent Authentication; the other chooses to use the Abbreviated Handshake This can prevent the two MPs from communicating … Oops Draft 2.0 is unclear how MPs make a choice in an interoperable way When may “PLE  4WHS” be expected? When “AbbrvHS”? How do these two procedures interact? Is there a need to interact? Is it correct?

Analysis and Examples Suppose MP A wants to establish a secure link with MP B MP A decides how to proceed based its context A’s own state A’s understanding of B’s state Suppose, from B’s Beacon, A can tell whether B has an MKDSA There are at least 4 cases Case A B 1 MP 2 MA 3 4

Case 1 Case 1: Both A and B are only MPs, not MAs (neither has an MKDSA) Since A and B only have their own PMK, they can’t share a PMK Since neither is an MA, neither can authenticate the peer Result: failure in establishing a secure link

Cases 2 and Case 3 Case 2: A is an MP and B announces it is an MA A will initiate the Abbreviated Handshake using its own PMK Case 2.1: If B already has A’s PMK, the Abbreviated Handshake will succeed However, if B does not have A’s freshest PMK, AbbrevHS may fail; fall back to Case 2.2 below Case 2.2: If B doesn’t have A’s PMK, B can fetch A’s PMK and, when complete, initiate the Abbreviated Handshake or MSA 4WHS with A Case 3: A announces it is an MA and B is an MP Mirror image of Case 2, with the roles of A and B reversed

Case 4 Case 4: A and B both are MA Both should initiate AbbrHS Because the peer MA can fetch its own PMK Both should start key fetching simultaneously This is helpful since the first AbbrHS may fail

Key fetchingAbbrHS, or Implications Case A B A’s action 1 MP failure 2 MA, no PMK for A AbbrHS MA w/ A’s PMK 3 MA, no PMK for B Key fetchingAbbrHS, or PLE  key fetching4WHS MA w/ B’s PMK AbbrHS + key fetching 4 MA AbbrHS works for last 3 cases (case 1 not applicable) PLE+key fetching  4WHS seems to work for only cases 2.1, 3.1 Slides 15-16 suggest how to achieve this option, but with a complexity cost AbbrHS is a better system solution for cases 2.1, 3.1 AbbrHS binds key with session, while 4WHS doesn’t: better security Are special cases 2.1, 3.1 worth the extra complexity?

Co-Existence Issue Current draft allows both protocol options AbbrHS or PLE  MSA 4WHS When to choose one option unspecified Question: Can both protocols co-exist? Our conclusion: Freedom to choose increases non-interoperatability implementation and deployment complexity!

The Choice Cases One possible situation: (MA) A B (MP) One possible situation: B initiates AbbrHS, simultaneously A initiates 4WHS When B receives 4WHS Message 1 from A, two options Abandon either its own AbbrHS or ignore Message 1 Keep both; if one of completes first, abandon the other We are concerned about co-existence issue, so let’s analyze the latter If B keeps both, there is always a race condition It can’t abandon 4WHS if AbbrHS drives to ESTAB first, since it doesn’t know if A has received its last Confirm message before going to ESTAB It can’t abandon AbbrHS if it sends Message 4 before finishing AbbrHS, since it doesn’t know whether A has received Message 4 or not Similar issue on A’s side

Implications Existence of race conditions that can be avoided imply that a decision to choose one or the other is needed If B (MP) runs AbbrHS under case 2, A has to run AbbrHS as well to avoid race condition Alternative: no AbbrHS is allowed, both parties run PLE4WHS Fail to provide explicit secure session binding as AbbrHS does Vulnerability window exists Complex protocol interaction between PLM, 4WHS, and Key Transport Significant performance degradation (4 messages vs. 8 messages)

Analysis Conclusions “PLE  authentication  4WHS” could still be used for initial key establishment AbbrHS and “PLE4WHS” cannot co-exist Suggestion Use Abbreviated Handshake to support all other cases Improve robustness by explicitly specifying interaction with key transport protocol

Backup Slides

Initiating Key Transport Protocol

More Details (1) Phase 1: Peer Link Establishment MP A and B sends candidate PMKIDs of cached PMK-MAs, in PMKID List, ordered by expiry time (the one expires last goes first) When receiving Open frame, compare two lists If intersection is non-empty, selected PMK=PMK in the intersect that expires last If intersection is empty, set “selected PMK” empty, and If at least one MP is MA and maintains MKDSA, go to phase 2 If no MP is MA or no MP maintains MKDSA, peer link establishment fails (because the two MPs cannot be authenticated either) When the MP establishes an unprotected link successfully If selected PMK is not empty, selector MP (higher MAC address) initiates phase 3 If selected PMK is empty, initiate phase 2 and set a timer to limit time to wait for ending phase 2 Phase 2: one MP or both MPs execute key transport protocol to fetch the peer’s latest PMK-MA This depends on MP’s situation, not decided by key selection procedure When the MP finishes key transport protocol successfully, proceed to phase 3 When the MP fails to fetch the key, do nothing* Note: This is interesting. It looks like MSA needs to choose either execute authentication or key transport protocol, but not both. In above case, the authentication is not explicitly requested. Now if the peer MP comes back with failed key fetching, it means it’s not capable to be MA for authenticating the local MP. It doesn’t make sense to try authentication after failed key transport. So, when the local MP fails to fetch the key, it should wait for the peer MP to either launch 4WHS (if the peer fetches the key successfully) or wait for timeout to declare failure.

More Details (2) MP goes to phase 3 (MSA 4WHS) if (1) MP receives message 1 of MSA 4WHS or (2) the selected PMK is selected successfully, or (3) the MP fetches the key successfully If the timer expires before going to phase 3, this means fetching key is not successfully at all Since the security association is required, the MPs should tear down the link After initiating phase 3, if MP receives M1 from peer MP, need a tie break Higher MAC address (selector MP) has advantage Keep the protocol initiated by selector MP Abandon the other