Secure Key Distribution and Authorization

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1867r1 Submission November r Security TeamSlide 1 TGr Security Requirements Notice: This document has been prepared to.
Advertisements

Use of KCK for TGr Management Frame Protection
Secure 3-Party Protocol
LB84 General AdHoc Group Sept. Closing TGn Motions
LB84 General AdHoc Group Sept. Closing TGn Motions
[ Interim Meetings 2006] Date: Authors: July 2005
Resource Request/Response Discussion
TGn Sync Atlanta Presentation on Confirmation
Motions Date: Authors: January 2006
TGu/TGv Joint Session Date: Authors: July 2005 July 2005
London TGu Motions Authors: January 2007 Date: Month Year
LB73 Noise and Location Categories
LB73 Noise and Location Categories
Waveform Generator Source Code
March 2014 Election Results
TGp Closing Report Date: Authors: July 2005 Month Year
TGp Closing Report Date: Authors: July 2007 Month Year
Attendance and Documentation for the March 2007 Plenary
Attendance and Documentation for the March 2007 Plenary
3GPP Extended Date: Authors: July 2005 July 2005
[ Policies and Procedure Summary]
[ Policies and Procedure Summary]
3GPP liaison report May 2006 May 2006 Date: Authors:
Motion to accept Draft p 2.0
Protected SSIDs Date: Authors: March 2005 March 2005
3GPP liaison report July 2006
[place presentation subject title text here]
Motions Date: Authors: January 2006
Fast Transition Mobility (FTM) Domain
TGp Motions Date: Authors: November 2005 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
TGu-changes-from-d0-02-to-d0-03
TGp Closing Report Date: Authors: May 2007 Month Year
TGp Closing Report Date: Authors: March 2006 Month Year
Reflector Tutorial Date: Authors: July 2006 Month Year
TGv Redline D0.07 Insert and Deletion
TGv Redline D0.06 Insert and Deletion
ADS Study Group Mid-week Report
TGu-changes-from-d0-01-to-d0-02
Number of Encoder as a function of MCS
LB73 Noise and Location Categories
TGy draft 2.0 with changebars from draft 1.0
TGv Redline D0.10 Insert and Deletion
IEEE WG Opening Report – July 2007
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Redline of draft P802.11w D2.2 Date: Authors:
TGr Authentication Framework
TGu-changes-from-d0-02-to-d0-03
[ Policies and Procedure Summary]
March Opening Report Date: Authors: March 2011
TGu Motions Date: Authors: May 2006 May 2006
Beamforming and Link Adaptation Motions
[ Policies and Procedure Summary]
Draft P802.11s D1.03 WordConversion
Questions to the Contention-based Protocol (CBP) Study Group
TGr Authentication Framework
Motion to go to Letter Ballot
EC Motions – July 2005 Plenary
TGu-changes-from-d0-04-to-d0-05
Transition Nowhere Date: Authors: Sept 2005 Sept 2005
TGp Closing Report Date: Authors: January 2006 Month Year
TGu-changes-from-d0-03-to-d0-04
TGu Motions Date: Authors: May 2006 May 2006
TGu Draft Revision Procedure
WAPI Position Paper Sept 2005 Sept 2005 IEEE WG
Use of KCK for TGr Management Frame Protection
Use of KCK for TGr Management Frame Protection
Use of Nonces in Fast Transitioning Flows
TGr Proposed Draft Revision Notice
TGp Motions Date: Authors: January 2006 Month Year
Presentation transcript:

Secure Key Distribution and Authorization July 2005 Secure Key Distribution and Authorization Date: 2005-07-07 Author(s): Name Company Address Phone Email Dan Harkins Trapeze Networks 5753 W. Las Positas blvd Pleasanton, CA 94588 +1 925 474 2212 dharkins@trpz.com Notice: This document has been prepared to assist IEEE 802.11. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE’s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE’s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.11. Patent Policy and Procedures: The contributor is familiar with the IEEE 802 Patent Policy and Procedures <http:// ieee802.org/guides/bylaws/sb-bylaws.pdf>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <stuart.kerry@philips.com> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.11 Working Group. If you have questions, contact the IEEE Patent Committee Administrator at <patcom@ieee.org>. Dan Harkins, Trapeze Networks

Current text on Key Distribution July 2005 A key is retrieved from “the infrastructure” in a method “beyond the scope of this specification.” It “requires that keys only be distributed down the key hierarchy using a secure transport protocol.” This is inadequate. Dan Harkins, Trapeze Networks

Implication of Current Text July 2005 Implication of Current Text Possession of a key implies authorization to possess that key. This is incorrect. Any STA that encounters an authenticator in possession of a PMK that it has not authorized should cause the STA to cease using the entire key hierarchy from which that PMK derived. Dan Harkins, Trapeze Networks

“secure transport protocol”? July 2005 Authentication and confidentiality are not enough Other security objectives are needed Authorization: official sanction is given to an entity to become something that it is not (e.g. a PMK derivative holder) Validation: provide timeliness to authorization to ensure the sanction has bounds Correctness: a STA’s authorization attributes (from AAA) follow it through a FBT Dan Harkins, Trapeze Networks

A “secure transport protocol” July 2005 We cannot punt this problem to another standards body or say it is “out of scope” Elevation of privilege issues Lack of authorization means that there is no way to distinguish between a compromised PMK derivative and a non-compromised PMK derivative in the hands of some random NAS No assurance that the PMK derivative is bounded Dan Harkins, Trapeze Networks

A Secure Protocol to meet these enhanced objectives July 2005 A Secure Protocol to meet these enhanced objectives TTAP’s NAS PMK-R0 holder STA ID-sta, ID-r0kh, {ID-ttap-nas, Ns}mk ID-sta, {ID-ttap-nas, Ns}mk {ID-sta, Ns, Na, PMK-R1, author}k, {ID-ttap-nas, Na}mk {ID-ttap-nas, Na}mk, MIC Where: ID-sta is the NAI send during the EAP exchange ID-r0kh is the identity (NAS-Id nee R0KH) of the PMK-R0 holder ID-ttap-nas is the NAS-Id of the authenticator of the TTAP Ns is a nonce supplied by the STA Na is a nonce supplied by the PMK-R0 holder author are authorization attributes associated with PMK-R0 mk is a key shared between the STA and the PMK-R0 holder k is a key shared between the TTAP and the PMK-R0 holder MIC is SHA-256(Ns|Na) Dan Harkins, Trapeze Networks

Security Objectives Met July 2005 Security Objectives Met Authentication of the entities involved in key distribution Confidentiality of the key distribution Authorization of the status of PMK-R1 holder Validation of the authorization Receipt of the key is acknowledged Correctness of the authorization attributes assigned to the STA Dan Harkins, Trapeze Networks

July 2005 Motion Instruct the editor to incorporate changes from 11-05-677-00-000r into the 11r draft. Dan Harkins, Trapeze Networks