Defense Against Multi-Channel Man-in-the-Middle (MITM)

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0560r0 Submission May 2010 Ashish Shukla, MarvellSlide 1 TDLS TPK Handshake Date: Authors:
Advertisements

Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Robust Security Network (RSN) Service of IEEE
STAKey Design Flaws Date: Jesse, Shlomo, Suman
Relay Threat Model for TGaz
Relay Threat Model for TGaz
2200 Mission College Blvd., Santa Clara, CA 95054, USA
FILS presentation on High Level Security Requirements
Ranging ID and its Lifetime Management
2200 Mission College Blvd., Santa Clara, CA 95054, USA
Pre-association Security Negotiation for 11az SFD Follow up
Relay Threat Model for TGaz
Relay Threat Model for TGaz
BSS Max Idle Period and Sleep Interval
TGaq Pre-Association Summary
Multiple BSSID and MU Date: Authors: Nov 2016 Liwen Chu
Frame Protection for 11az
TGai FILS Authentication Protocol
Pre-association Security Negotiation for 11az SFD Follow up
Mesh Security Proposal
TDLS TPK Handshake Date: Authors: May 2010 May 2010
IGTK Switch Announcement
Discovery Assistance for ay
Defense Against Multi-Channel Man-in-the-Middle (MITM)
BSS Scanning through Low Power Radio
BSS Max Idle Time Advertisement
Operation after Wake-up Frame Transmission and Reception
Multi-band Discovery Assistance
Assign and Update Wake-Up Signals in WLAN with Wake-Up Radio Receivers
IGTK Switch Announcement
Multi-band Discovery Assistance
Pre-Association Security Negotiation (PASN) for 11az
OCT based 6 GHz AP Operation Discussion
WUR MAC Consideration Date: Authors: Nov 2016 Liwen Chu
Broadcast and Unicast Management Protection (BUMP)
Broadcast and Unicast Management Protection (BUMP)
Multi-band Discovery Assistance for ay (CR on CID 1771)
Traffic Class Control in MBSS
Traffic Class Control in MBSS
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
Jesse Walker and Emily Qi Intel Corporation
Proposed resolution of CID 3518
Proposed resolution of CID 3518
Pre-Association Negotiation of Management Frame Protection (PANMFP)
Multi-band Discovery Assistance for ay (CR on CID 1771)
Discovery Assistance for ay
A Simplified Solution For Critical A-MPDU DoS Issues
Reducing Overhead in Active Scanning with Simulation Results
Performance Analysis of authentication and authorization
Rekeying Protocol Fix Date: Authors: Month Year
Broadcast Service Advertisements
FTM Frame Exchange Authentication
Reducing Overhead in Active Scanning with Simulation Results
A Simplified Solution For Critical A-MPDU DoS Issues
Beacon Protection Date: Authors: July 2018 July 2018
CR for CID 1115 Date: Authors: May 2019
Beacon Protection Date: Authors: May 2018 January 2018
Use of EAPOL-Key messages
Link Setup Flow July 2011 Date: Authors: Name Company
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Defense Against Multi-Channel Man-in-the-Middle (MITM)
Initial Negotiation for WUR
Broadcast Service Advertisements
Multiple Frequency Channel Scanning
CR for CID 1115 Date: Authors: May 2019
Discussion on Multi-link Setup
Request for Legacy IE ID for RSN Extension
Multi-link Association Setup
Presentation transcript:

Defense Against Multi-Channel Man-in-the-Middle (MITM) October 2016 doc.: IEEE 802.11-16/1289r0 October 2017 Defense Against Multi-Channel Man-in-the-Middle (MITM) Date: 2017-10-30 Authors: Name Affiliations Address Phone Email Nehru Bhandaru Broadcom Ltd. 190 Mathilda Place, Sunnyvale, CA 94086 +1 408 922 5924 nehru.bhandaru@broadcom.com Thomas Derham thomas.derham@broadcom.com Mathy Vanhoef KU Leuven mathy.vanhoef@cs.kuleuven.be Nehru Bhandaru et. al. Adrian Stephens (Intel Corporation)

Introduction Recent IV Reset attacks against 802.11 RSN Mathy Vanhoef Paper CVE-2017-12968, CVE-2017-13077 CVE-2017-13079 CVE-2017-13080 CVE-2017-13081 CVE-2017-13084 CVE-2017-13086 CVE-2017-13087 CVE-2017-13088 Other exchanges (e.g. FTM, FILS) can be attacked Attacker relays frames Channel based MITM Masquerades as STA against legitimate AP on Channel A Masquerades as AP against legitimate STA on Channel B Generic defense against MITM requires Authentication Verification of protocol attributes Need protocol robustness against generic multi-channel attacks 2

Channel-based MITM STA Attacker AP Attacker STA AP Channel A Channel B PTK/GTK Handshake, FTM PTK/GTK Handshake, FTM Attacker uses AP MAC address on Channel A, STA MAC address on Channel B relays frames between AP and STA may buffer frames, drop ACKs and cause retransmissions 3

Possible RSN defense for multi-channel MITM Advertise operating channel validation in RSNE Capability OCVC, Policy OCVR (Required)? Add operating channel information to RSN handshakes Similar to RSNE to protect against cipher downgrade Operating Channel Information (OCI) KDE Country, Operating Class, Channel Number or their Hash OCI KDE, under MIC protection included in M2 and M3 of 4-way handshake G1 and G2 of GTK handshake Receiver compares current operating channel information with that received in KDE Discard on mismatch if OCVC peer Discard on absence if OCVR device 4

Related Topics - FT, FILS, FTM Do FT handshakes need this protection? Initial FT association uses 4-way handshake Reassociation MIC does not include channel information VHT/HT Operation Elements from AP → non-AP STA Non-HT ? non-AP STA→ AP Include channel information as optional Subelement in FTE FTE is already validated via MIC Channel information needs to be validated if OCVC Do FILS handshakes need this protection? Association frames protected by MIC EAPOL frames protected by AEAD Include channel information KDE No change to FTE in TPK handshake Should 11az provide this protection? Authenticate channel information along with LMR feedback? 5

Related Topics - Channel Switch Channel switch during 4-way or GTK handshake? Unlikely, but M1 and M4 need to be validated to be on the same channel as M3 and M2 respectively BSS Transition okay FT Action is protected Reassociation and key confirmation Channel Switch Announcements Beacons, Unprotected or Protected Dual of Public Action Recommend using Protected announcements Attacker may block even protected CSA and assume MITM position Attack window open until next handshake When peer STA supports OCVC initiate an SA Query? SA Query and Response frame extension to include channel information Channel information validation on SA query receipt Disassociate if validation fails 6

Related Topic - Same Channel MITM AP and STA are within range of each other Hard to attack reliably Buffering and replay not effective AP and STA are out of range, but in range of the attacker Is there anything that can be done here? 7

Strawpoll(s) 802.11 specification should define a mechanism to protect against multi-channel MITM Y: N: A: RSNE should advertise operating channel validation capability and policy Validation: Require: None: Operating channel information should be included and MIC protected in RSN key exchanges - Pairwise and Group Key handshakes Operating channel information should consist of one of Country, Operating Class and Channel(s) Hash of Operating Channel Information Other 8