Secure 3-Party Protocol

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Advertisements

Use of KCK for TGr Management Frame Protection
Coexistence Motions for LB84 Comment Resolution
LB84 General AdHoc Group Sept. Closing TGn Motions
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
Motions Date: Authors: January 2006
IEEE White Space Radio Contribution Title
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
TGu Closing Report Date: Authors: November 2005
March 2014 Election Results
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
Secure Key Distribution and Authorization
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
R0KH-R1KH protocol requirements
[place presentation subject title text here]
Motions Date: Authors: January 2006
Fast Transition Mobility (FTM) Domain
TGp Motions Date: Authors: November 2005 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
Emergency Call Motion Date: Authors: January 2006
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
Solution for comment 32 Date: Authors: July, 2008
ADS Study Group Mid-week Report
IEEE P Wireless RANs Date:
Protection Assurance Method
TGu-changes-from-d0-01-to-d0-02
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D1.04-D1.0 Insert and Deletion
TGv Redline D0.10 Insert and Deletion
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGp Closing Report Date: Authors: March 2007 Month Year
TGr Proposed Draft Revision Notice
Off-channel selection
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
May 2005 CAPWAP AHC Closing Report
TGu Motions Date: Authors: May 2006 May 2006
Beamforming and Link Adaptation Motions
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
Motion to go to Letter Ballot
TGu-changes-from-d0-04-to-d0-05
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
Reserve Option Contradiction
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
TGr Proposed Draft Revision Notice
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

Secure 3-Party Protocol May 2006 doc.: IEEE 802.11-06/0695r0 May 2006 Secure 3-Party Protocol Date: 2006-05-14 Authors: Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Dan Harkins, Tropos Networks

May 2006 doc.: IEEE 802.11-06/0695r0 May 2006 Abstract This document describes how the secure 3 party protocol (11-06/0637) operates to authorize key holders to possess a PMK-R1 and distribute the appropriate key and attributes to it. Dan Harkins, Tropos Networks

What’s the problem? The draft doesn’t say how to distribute a PMK-R1. May 2006 doc.: IEEE 802.11-06/0695r0 May 2006 What’s the problem? The draft doesn’t say how to distribute a PMK-R1. It must be done “securely” It must contain “binding information” (whatever that is!) The MDC facilitates the authentication of key holders and “the identities of the Key Holders presented to the MDC shall be the same as that advertised to the STA”. What identities would that be? How are these identities advertised to the STA? Interoperability is not possible. There is an assumption that possession of a PMK-R1 implies authorization to hold it. Dan Harkins, Tropos Networks

What’s the solution? A secure 3 party protocol! Provide all the features that the draft says are necessary– confidentiality, integrity validation, replay protection, and key binding– as well as two other essential ones Authorization: a key holder is sanctioned by both the STA and the PMK-R0 holder to become a legitimate holder of a PMK-R1 Validation: the authorization is acknowledged and the key holder can demonstrate it’s new status. The players: STA, target AP, and PMK-R0 holder

The Basic Assumptions Each key holder is identified by its 802.1X authenticator’s NAS-Id. The NAS-Id is the identity each key holder uses when it establishes security associations with other key holders (as facilitated by the MDC). A security association between 2 key holders provides a secure channel for communication between them. Each AP beacons out the NAS-Id of the 802.1X authenticator it is part of.

How it Logically Works MDC “B” “C” “A” “A and C” “B” “C” “A” “A and B” “B and C” APs identify each other by NAS-Id and establish SAs with each other with the help of the MDC

How it Logically Works “B” “C” “A” STA does initial association with A, A becomes PMK-R0 holder STA hands off to B, does 3 party protocol, B becomes PMK-R1 holder, STA does FT with B STA hands off to C, does 3 party protocol, C becomes PMK-R1 holder, STA does FT with C “B” PMK-R1 “C” “A” PMK-R1 PMK-R0

The Protocol STA target AP PMK-R0 holder ID-STA is MAC address ID-TAP is NAS-ID Ns is a random number chosen by the STA Na is a random number chosen by the PMK-R0 holder mk is a key shared between the STA and PMK-R0 holder AUTH is SHA-256(Na | Ns) {Z}x is AES Key wrapping of Z with symmetric key x R0KH-ID, {Ns, ID-TAP}mk ID-STA, {Ns, ID-TAP}mk ID-STA, Na, Ns, PMK-R1, auth-attributes, PMKR1Name, {ID-TAP, Na}mk AUTH, {ID-TAP, Na}mk

Comments? Complaints? Criticisms? Questions? Comments? Complaints? Criticisms?

Motion Adopt the changes specified in 06/0637r0 into the next TGr draft