The dangers of pre-shared key and why a certificate OID is needed.

Slides:



Advertisements
Similar presentations
Man in the Middle Attack
Advertisements

CSE 461 Section. “Transport Layer Security” protocol Standard protocol for encrypting Internet traffic Previously known as SSL (Secure Sockets Layer),
Encryption, SSL and Certificates BY JOSHUA COX AND RACHAEL MEAD.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Doc.: IEEE /540 Submission July 2003 Arunesh Mishra, Min-ho Shin, William Arbaugh, Insun Lee, Kyunghun Jang. Fast handoffs using Fixed Channel.
WIRELESS LAN SECURITY AND LABORATORY DESIGNS
Doc.: IEEE /084r0-I Submission January 2003 Mishra, Shin, Arbaugh, Lee, Jang Proactive Key Distribution to support fast and secure roaming Arunesh.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Doc.: IEEE /084r1 Submission January 2003 Mishra, Shin, Arbaugh, Lee, Jang Proactive Key Distribution to support fast and secure roaming Arunesh.
1 An Empirical Analysis of the IEEE MAC Layer Handoff Process Arunesh Mishra Minho Shin William Arbaugh University of Maryland College Park,MD,USA.
ENCRYPTION, SSL, CERTIFICATES RACHEL AKISADA & MELANIE KINGSLEY.
Bootstrapping Key Infrastructures

Module 48 (Wireless Hacking)
CAPWAP Threat Analysis
Robust Security Network (RSN) Service of IEEE
TOPIC: HTTPS (Security protocol)
Virtual Private Networks and IPSec
Wireless Technologies
M. Kassab, A. Belghith, J. Bonnin, S. Sassi
September 2005 Test Methodology, Metrics and Test Cases for measuring BSS Transition Performance Date: Authors: Notice: This document has been.
Month Year doc.: IEEE yy/xxxxr0 May 2012
Secure Sockets Layer (SSL)
Proposed SFD Text for ai Link Setup Procedure
PPP – Point to Point Protocol
Module 8: Securing Network Traffic by Using IPSec and Certificates
KMIP Client Registration Ideas for Discussion
Pre-association Security Negotiation for 11az SFD Follow up
Man-in-the-Middle Attacks
Wireless LAN Security 4.3 Wireless LAN Security.
Pre-association Security Negotiation for 11az SFD Follow up
SECURING WIRELESS LANS WITH CERTIFICATE SERVICES
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
Idle Mode Operation for IEEE v
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Pre-Association Security Negotiation (PASN) for 11az
(Man in the Middle) MITM in Mesh
Proposed IRTF Research Group on Fast Hand-offs
A Programmer’s Guide to Secure Connections
Public Key Infrastructure
Fast Authentication in TGai : Updates to EAP-RP
Jesse Walker and Emily Qi Intel Corporation
Password Authenticated Key Exchange
Module 8: Securing Network Traffic by Using IPSec and Certificates
11i PSK use in 11s: Consider Dangerous
Link Setup Flow July 2011 Date: Authors: Name Company
Roaming timings and PMK lifetime
Kai Bu 05 Secure Connection The topic to be covered this week is secure connection. Apparently, the.
FTM Frame Exchange Authentication
TGr Authentication Framework
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Chapter 5 TCP Control Flow
TG1 Draft Topics Date: Authors: September 2012 Month Year
Dan Harkins Trapeze Networks
Roaming timings and PMK lifetime
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
TG1 Draft Topics Date: Authors: September 2012 Month Year
TGr Authentication Framework
刘振 上海交通大学 计算机科学与工程系 电信群楼3-509
While the audience is gathering. During breaks etc
Month Year doc.: IEEE yy/xxxxr0 May 2012
PSK Treatment Options Date: 19 September 2005 Authors: September 2005
Link Setup Flow July 2011 Date: Authors: Name Company
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Secure Diffie-Hellman Algorithm
11i PSK use in 11s: Consider Dangerous
The way forward A set of straw polls to guide TGh through
NFD Tunnel Authentication
Transport Layer Security
Presentation transcript:

The dangers of pre-shared key and why a certificate OID is needed. September 2003 The dangers of pre-shared key and why a certificate OID is needed. Arunesh Mishra, Minho Shin, William Arbaugh University of Maryland College Park Insun Lee, Kyunghun Jang Samsung Electronics Mishra, Shin, Arbaugh, Lee, Jang

September 2003 Pre-shared key (PSK) Everyone shares the same PMK therefore we have both an active and a passive attack by insiders. Mishra, Shin, Arbaugh, Lee, Jang

Passive Attack - Eavesdropping September 2003 Passive Attack - Eavesdropping An insider (defined by knowledge of the PSK) can capture the 4-way handshake and derive the PTK allowing them to intercept traffic passively. Mishra, Shin, Arbaugh, Lee, Jang

Active Attack - Man in the middle September 2003 Active Attack - Man in the middle An insider can establish a man in the middle (MiTM) easily. Mishra, Shin, Arbaugh, Lee, Jang

This should not be new to you September 2003 This should not be new to you But- what is interesting is that the same problems exist with the use of certificates, if they are not created properly, i.e. How does the STA know the presented certificate belongs to a AAA server? There is no DNS or IP connectivity to verify the certificates attributes as in TLS. Mishra, Shin, Arbaugh, Lee, Jang

September 2003 Enter the OID MSFT caught this previously in L2TP, fortunately, and carried the prevention technique over to EAP/TLS. XP requires both a server and client OID in certificates: Server: 1.3.6.1.5.5.7.3.1 Client: 1.3.6.1.5.5.7.3.2 STA ONLY accepts a server certificate with the proper OID (Assumes CA only issues OID to AAA servers). Mishra, Shin, Arbaugh, Lee, Jang

September 2003 Recommendation Add informational text to draft explaining the dangers of PSK and strongly suggesting the use of both a server and client OID. Seek approval by the appropriate body of the server and client OIDs. Mishra, Shin, Arbaugh, Lee, Jang

September 2003 Straw Poll Would you approve of informational text that explains the dangers of PSK and strongly suggesting the use of both the server and client OIDS? If the group is in favor, text will be provided by Thursday morning for a vote in the afternoon. Mishra, Shin, Arbaugh, Lee, Jang