802.1X/ Issues Nancy Cam-Winget, Cisco Systems

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

P Security Survey and Recommendations By: Ryon Coleman October 16, 2003.
Oct 12, 2004CS573: Network Protocols and Standards1 Virtual LANs Network Protocols and Standards Autumn
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
1 © 2005 Cisco Systems, Inc. All rights reserved. 111 © 2004, Cisco Systems, Inc. All rights reserved.
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
Doc.: 802_Handoff_Linksec_Presentation Submission May David Johnston, IntelSlide Handoff LinkSec Handoff Issues? David Johnston
Doc.: IEEE /0476r3 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
1 © 2003, Cisco Systems, Inc. All rights reserved. CCNA 3 v3.0 Module 9 Virtual Trunking Protocol.
Doc.: IEEE /0707r0 Submission July 2003 N. Cam-Winget, et alSlide 1 Establishing PTK liveness during re-association Nancy Cam-Winget, Cisco Systems.
March 17, 2003 IETF #56, SAN FRANCISCO1 Compound Authentication Binding Problem (EAP Binding Draft) Jose Puthenkulam Intel Corporation (
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /322r0 Submission May 2002 Jesse Walker et alSlide 1 The Louie Architecture Nancy Cam Winget, Cisco Bob Moskowitz, TruSecure Greg Chesson,
Doc.: 802_Handoff_Linksec_Presentation Submission May David Johnston, IntelSlide Handoff LinkSec Handoff Issues? David Johnston
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Robust Security Network (RSN) Service of IEEE
Re-evaluating the WPA2 Security Protocol
Open issues with PANA Protocol
Some LB 62 Motions January 13, 2003 January 2004
802.11r Requirements Discussion
Chapter 5: Switch Configuration
Keying for Fast Roaming
VLANs: Virtual Local Area Networks
doc.: IEEE /xxxr0 Mike Moreton
802.1X and key interactions Tim Moore November 2001
TGi Motions for Comment Resolution
Motions to Address Some Letter Ballot 52 Comments
TSN Architecture Mike Moreton, STMicroelectronics
Mesh Security Proposal
Nancy Cam-Winget, Cisco Systems Inc
Technical Requirements for IEEE ESS Mesh Networks
Emergency Call Setup Procedure
Use of EAPOL-Key messages during pre-auth
PEKM (Post-EAP Key Management Protocol)
Multiple Concurrent Associations as a Means of Doing Fast Roaming
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Nancy Cam Winget, Atheros
Just-in-time Transition Setup
Robert Moskowitz, Verizon
Agenda retrospective - B. Aboba Lunch
Robert Moskowitz, Verizon
Nancy Cam-Winget, Cisco Systems Inc
AP Architecture Thoughts
Jesse Walker and Emily Qi Intel Corporation
802.1X and AKE Comparison Nancy Cam-Winget, Atheros
AES Associated Data Optimization
Pre-Association Negotiation of Management Frame Protection (PANMFP)
Roaming Keith Amann, Spectralink
Fast Roaming Compromise Proposal
Link Setup Flow July 2011 Date: Authors: Name Company
Mesh Security Proposal
EAPOL-Key Clarifications
Ch 17 - Binding Protocol Addresses
Fast Roaming Compromise Proposal
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Fast Roaming Compromise Proposal
802.1X and AKE Comparison Nancy Cam-Winget, Atheros
Public Action Frame Issue
Keying for Fast Roaming
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Overview of Improvements to Key Holder Protocols
Session MAC Address Solves Deadlocks
Fast Roaming Observations
TGi Draft 1 Clause – 8.5 Comments
Overview of Improvements to Key Holder Protocols
Link Setup Flow July 2011 Date: Authors: Name Company
Pre-Authentication with 802.1X
TGi Draft 1 Clause – 8.5 Comments
Comment Resolution Motions
Presentation transcript:

802.1X/802.11 Issues Nancy Cam-Winget, Cisco Systems March 2003 802.1X/802.11 Issues Nancy Cam-Winget, Cisco Systems Paul Congdon, Hewlett-Packard Jesse Walker, Intel Corporation Cam-Winget, Congdon, Walker; Cisco, HP, Intel

Agenda Issues with 4-way/group key handshakes March 2003 Agenda Issues with 4-way/group key handshakes Issues with pre-authentication Cam-Winget, Congdon, Walker; Cisco, HP, Intel

4-Way/Group Key Handshake Issues March 2003 4-Way/Group Key Handshake Issues These Represent new protocols, not simply message formats Have implications for the 802.1X statement machines Have expected sequencing with EAP-Success message Enable unicast and multicast traffic independently via same ‘port’ Obviously important and justifiable work Need to decide Whether this work belongs in 802.1X or in 802.11i How to resolve state machine interactions Minimize impact on both 802.11i and 802.1X Cam-Winget, Congdon, Walker; Cisco, HP, Intel

4-way Handshake New 802.1X protocol used to: Diverges from 802.1aa March 2003 4-way Handshake New 802.1X protocol used to: establish liveness between STA and AP Establish fresh PTK between STA and AP (at both 802.1X and 802.11 layers) Binds management of 802.1X and 802.11 keys Diverges from 802.1aa TGi relies on EAP-Success to trigger 4-way handshake Different than current 802.1X key state machine Incompatible with current 802.1aa state machines and interface Cam-Winget, Congdon, Walker; Cisco, HP, Intel

March 2003 Group Key Handshake Relies on a successful 4-way handshake, but not clarified in the 802.1X statement machine Relies on unicast traffic to be protected → implies partial port block or distinct port at both STA and AP Cam-Winget, Congdon, Walker; Cisco, HP, Intel

Consensus from 802.11i ad-hoc on 4-way handshake March 2003 Consensus from 802.11i ad-hoc on 4-way handshake Recommend that current key machines in 802.1aa are optional Indicate that other key machines defined in 802.11i may be used Indicate in 802.11i that 4-way handshake ‘replaces’ key machines of 802.1X and does not ‘use’ them as defined. Recommend and document appropriate key machine interface in 802.1aa Diagram interface to key machines Define variables and interface procedures Force opposite sequence of EAP-Success and key machine initiation in 802.1aa Cam-Winget, Congdon, Walker; Cisco, HP, Intel

Pre-authentication Issues March 2003 Pre-authentication Issues These 802.1X was not designed to work this way have implications for the 802.1X state machines potentially an additional security threats Obviously important and justifiable use of 802.1X Need to decide Whether this work belongs in 802.1X or in 802.11i How to resolve state machine interactions Minimize impact on both 802.11i and 802.1X Cam-Winget, Congdon, Walker; Cisco, HP, Intel

Pre-authentication Forwarding EAPOL frames over DS: March 2003 Pre-authentication Forwarding EAPOL frames over DS: Allows STA to authenticate with next AP prior to association via current AP Allows an STA to authenticate with multiple APs at a time Completes when the 1st message of the 4-way handshake is received by the new AP New paradigm for EAPOL over wired media Unicast EAPOL frames on wired media No concept of a ‘port’ over the DS to work with Termination conditions are different than normal wired EAPOL exchanges Cam-Winget, Congdon, Walker; Cisco, HP, Intel

Ideas to address pre-authentication issues March 2003 Ideas to address pre-authentication issues Define how 802.1X machines can run on wired shared media Create a new concept of a ‘virtual port’ for new MAC addresses or learning events Specify VLAN tagging rules for unicast EAPOL frames Encapsulate pre-authentication EAPOL frames differently Define a new Ethertype for pre-auth EAPOL frames to skirt issues current rules Establish a ‘connection’ to create a ‘virtual port’ for pre-auth converation Have 802.11i re-define authenticator state machines to support pre-auth using combinations of above Others? Cam-Winget, Congdon, Walker; Cisco, HP, Intel