Richard EAP-WAI Authentication Protocol 2009-07-26 Stockholm, IETF 75th draft-richard-emu-wai-00.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
CAPWAP Architecture draft-mani-ietf-capwap-arch-00 Mahalingam Mani Avaya Bob O’Hara Airespace Lily Yang Intel.
無線區域網路安全 Wireless LAN Security. 2 Outline  Wireless LAN – b  Security Mechanisms in b  Security Problems in b  Solutions for b.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
Chapter 8 Web Security.
Session-based Security Model for SNMPv3 (SNMPv3/SBSM) David T. Perkins Wes Hardaker IETF November 12, 2003.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Network Security1 – Chapter 5 (B) – Using IEEE 802.1x Purpose: (a) port authentication (b) access control An IEEE standard
Wireless and Security CSCI 5857: Encoding and Encryption.
Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011 Wireless Network Authentication Regnauld / Büttrich, Edit: Sept 2011.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Real Time Protocol (RTP) 김 준
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
Michael Milgramm, CEO/CTO Donald Kovalevich, President John Fricke, VP Business Development IdentaZone, Inc © Copyright 2012 IdentaZone provides a multi-layer.
Lecture 24 Wireless Network Security
1 Kerberos – Private Key System Ahmad Ibrahim. History Cerberus, the hound of Hades, (Kerberos in Greek) Developed at MIT in the mid 1980s Available as.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
1 Chapter 7 WEB Security. 2 Outline Web Security Considerations Secure Socket Layer (SSL) and Transport Layer Security (TLS) Secure Electronic Transaction.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /1145r1 Submission August WG Slide 1 Mutual Authentication Date: Authors: Slide 1.
Introduction to Port-Based Network Access Control EAP, 802.1X, and RADIUS Anthony Critelli Introduction to Port-Based Network Access Control.
Port Based Network Access Control
CLASSe PROJECT: IMPROVING SSO IN THE CLOUD Alejandro Pérez Rafael Marín Gabriel López
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
Robust Security Network (RSN) Service of IEEE
History and Implementation of the IEEE 802 Security Architecture
SBSM BOF Session-Based Security Model for SNMPv3
Wireless Protocols WEP, WPA & WPA2.
Cryptography and Network Security
Some LB 62 Motions January 13, 2003 January 2004
Carrying Location Objects in RADIUS
Wireless Local Area Network (WLAN)
Module 8: Securing Network Traffic by Using IPSec and Certificates
ERP extension for EAP Early-authentication Protocol (EEP)
Discussions on FILS Authentication
IETF-70 EAP Method Update (EMU)
The Tunneled Extensible Authentication Method (TEAM)
– Chapter 5 (B) – Using IEEE 802.1x
Cryptography and Network Security
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
Mesh Security Proposal
PEKM (Post-EAP Key Management Protocol)
Mutual Authentication
Agenda retrospective - B. Aboba Lunch
Mutual Authentication
Wireless Access Points
Module 8: Securing Network Traffic by Using IPSec and Certificates
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
Overview of Improvements to Key Holder Protocols
Electronic Payment Security Technologies
Overview of Improvements to Key Holder Protocols
Cryptography and Network Security
An EAP Authentication Method Based on Identity-Based Authenticated Key Exchange draft-cakulev-emu-eap-ibake-00 Violeta Cakulev
Presentation transcript:

Richard EAP-WAI Authentication Protocol Stockholm, IETF 75th draft-richard-emu-wai-00

WAPI is a WLAN security protocol and brought forward By a Standard Group in China. It was invited by the ISO/IEC/JTC1/SC6 to submit it as an international proposal in June, 2009 Although WAPI is independent to the AAA, I think WAPI should have a deployment model which would reuse the AAA architecture. The carriers in the China agree to my idea, and we wrote this draft together. The draft demonstrates that EAP protocol and Radius Protocol are very extensible. Preface

 WAPI Overview  Benefits of the EAP-WAI  Design Idea  EAP-WAI Process Agenda

WAPI is the abbreviation of WLAN Authentication and Privacy Infrastructure WAPI Overview (1/4) WLAN Privacy Infrastructure (WPI) To provide the data protect (encryption) and data integration service. WLAN Authentication Infrastructure (WAI) To offer the function of authentication and key management WAPI mainly includes two parts:

WAPI Overview (2/4) WAI Protocol ASUE AEASE WAI over WAI over UDP Ethernet Type 0x88B4UPD Port 3810 The WAI is a core part of the WAPI protocol. ASUE Authentication Supplicant Entity AE Authenticator Entity ASE Authentication Service Entity

WAPI Overview (3/4) The Highlight of WAPI Although it depends on the three entities, it is independent to AAA architecture; Supports the mutual authentication between station (ASUE) and the WLAN devices (AE); The public-key certificate is an important part of the construction of WAPI system. The identity of ASUE and AE can be uniquely identified by the certificate; During the authentication phase, both WLAN device (AE) and station (ASUE) would send their certificates to the ASE. The ASE verify the legality of both certificates and would send the result of verification to the station and WLAN devices.

Here is the key points to EAP-WAI WAPI Overview (4/4) The main process Beacon Authentication Association Trigger Authentication Certificate Authentication Request Authentication Request Authentication Reply Unicast key negotiation Request Unicast key negotiation Reply Unicast key Confirm Multicast key Notification Multicast key Reply Process WAPI Process Authentication Key Negotiation Certificate Authentication Reply

 WAPI Overview  Benefits of the EAP-WAI  Design Idea  EAP-WAI Process Agenda

Benefits of the EAP-WAI If WAPI supports the deployment model of reusing AAA architecture, then: Independent software vendor (ISV) could easily make the current AAA server support the ASE function ; As the deployment of the additional ASE server could be not required, it would reduce the costs of the WAPI infrastructure's deployment and maintenance The WAPI offers the link-level security to the ASUE, e.g., the authentication and confidentiality. Besides them, ASUE needs the authorization and accounting service. The AAA already supports such functions well, and the WAPI could easily reuse such services if it could reuse AAA architecture.

 WAPI Overview  Benefits of the EAP-WAI  Design Idea  EAP-WAI Process Agenda

Design Idea (1/2) In order to reuse the AAA architecture and avoid the influence to the station (ASUE), the EAP packet exchanged SHOULD be between the AE and the AAA server. As AAA server's peer is station (ASUE), the WLAN Device (AE) SHOULD mimic itself as a peer (ASUE). By this way, from the AAA server perspective, EAP-WAI is similar to the other authentication methods

Design Idea (2/2) AE would mimic itself as a peer (ASUE) to AAA For AAA, EAP-WAI is similar to the other authentication methods NO Change

 WAPI Overview  Benefits of the EAP-WAI  Design Idea  EAP-WAI Process Agenda

EAP-WAI Process As AE SHOULD mimic a peer (ASUE), there is no need to let AE send the EAP- Request/Identity to ASUE any more The EAP identity MAY be the subject [RFC3280] of ASUE's certificate.

Any Question? Thank You