doc.: IEEE /252 Bernard Aboba Microsoft

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Doc.: IEEE /0377r1 Submission March 2004 Areg Alimian CMC, Bernard Aboba MicrosoftSlide 1 Analysis of Roaming Techniques Areg Alimian Communication.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE /084r0-I Submission January 2003 Mishra, Shin, Arbaugh, Lee, Jang Proactive Key Distribution to support fast and secure roaming Arunesh.
Doc.: IEEE /562r1 Submission November 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /084r1 Submission January 2003 Mishra, Shin, Arbaugh, Lee, Jang Proactive Key Distribution to support fast and secure roaming Arunesh.
Module 48 (Wireless Hacking)
Robust Security Network (RSN) Service of IEEE
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
Mobile IP.
M. Kassab, A. Belghith, J. Bonnin, S. Sassi
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Jari Arkko Bernard Aboba
Discussions on FILS Authentication
Keying for Fast Roaming
The Network Beacon Announcement scanning method
802.1X and key interactions Tim Moore November 2001
Wireless Security Potpourri
Mesh Security Proposal
MAC Address Hijacking Problem
Proposal for IEEE 802.1CQ-LAAP
Proposal for IEEE 802.1CQ-LAAP
Use of EAPOL-Key messages during pre-auth
PEKM (Post-EAP Key Management Protocol)
Nancy Cam Winget, Atheros
Proposal for IEEE 802.1CQ-LAAP
IEEE k Security: A Conceptual Model
Fast Authentication in TGai : Updates to EAP-RP
Jesse Walker and Emily Qi Intel Corporation
Motorola TGr Fast Handover Proposal
Pre-Association Negotiation of Management Frame Protection (PANMFP)
Roaming Keith Amann, Spectralink
Tim Moore, Microsoft Corporation Clint Chaplin, Symbol Technologies
Analysis of Roaming Techniques
Fast Roaming Compromise Proposal
Link Setup Flow July 2011 Date: Authors: Name Company
Florent Bersani, France Telecom R&D
Rekeying Protocol Fix Date: Authors: Month Year
Roaming timings and PMK lifetime
Fast Roaming Compromise Proposal
Fast Roaming Compromise Proposal
Roaming timings and PMK lifetime
Keying for Fast Roaming
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
doc.: IEEE /1072r0 Dan Harkins Trapeze Networks
Session MAC Address Solves Deadlocks
Fast Roaming Observations
Thinking About the Site Report
Cooperative AP Discovery
Use of EAPOL-Key messages
Link Setup Flow July 2011 Date: Authors: Name Company
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Roaming timings and PMK lifetime
Site Report Conceptual Model
Presentation transcript:

doc.: IEEE 802.11-01/252 Bernard Aboba Microsoft May 2001 16 January 2019 Fast Handoff Issues Bernard Aboba Microsoft Bernard Aboba, Microsoft Bernard Aboba, Microsoft

Outline Problem Statement Overall latency budget Pre-authentication 16 January 2019 Outline Problem Statement Overall latency budget Pre-authentication Fast-Handoff Performance diagram Key Generation Bernard Aboba, Microsoft

16 January 2019 Problem Statement To attempt to complete all activities necessary for a STA to be functional when connected to a new AP More than just an 802.11 problem, but 802.11 latency is important Definition of “functional” depends on the application Example applications Multimedia streaming (150ms) VOIP (50ms) Bernard Aboba, Microsoft

Latency Budget 16 January 2019 Bernard Aboba, Microsoft Layer Item Time (ms) L2 802.11 scan (passive) 0 ms (cached), 1 second (wait for Beacon) 802.11 scan (active) 40 to 300 ms 802.11 assoc/reassoc (no IAPP) 2 802.11 assoc/reassoc (w/ IAPP) 40 802.1X authentication (full) 1000 802.1X authentication (fast resume) 250 Fast handoff (4-way handshake only) 60 L3 DHCPv4 Initial RS/RA 5 Wait for subsequent RA 1500 DAD (full) Optimistic DAD MN-HA BU 1 RTT (IKE w/HA SA), 4 RTT (IKE w/CoA SA) MN-CN BU 1-1.5 RTT (CAM) to 2.5 RTT (RR) L4 TCP parameter adjustment (status quo) 5000 (802.11/CDMA) - 20000 (802.11/GPRS) Best case All fixes 150 ms Average case 6to4, RR, Active scan 1300 ms Worst case No TCP changes, full EAP auth, IAPP, DHCPv4 25000 ms Bernard Aboba, Microsoft

Pre-Authentication w/802.1X 16 January 2019 Pre-Authentication w/802.1X Channel 11 Channel 6 c v D AP B STA AP A STA authenticates and associates to AP A on Channel 6 802.1X data frames with “From DS” and “To DS” set to false (Class 1) STA does passive or active scan, moves, selects AP B as “potential roam” STA authenticates to AP B before connectivity is lost to AP A (if DT < c/v) Can send unicast 802.1X data frames to AP B, forwarded by AP A “From DS” or “To DS” set to true (Class 3) Can tune radio to Channel 11 (if B > r DT) STA reassociates to AP B Bernard Aboba, Microsoft

Reassociation w/4-way Handshake Only 16 January 2019 Reassociation w/4-way Handshake Only Channel 11 Channel 6 c v D AP B STA AP A STA had previously associated with AP B STA authenticates and associates to AP A on Channel 6 802.1X data frames with “From DS” and “To DS” set to false (Class 1) STA does passive or active scan, moves, selects AP B as “potential roam” STA recognizes that it has already derived a PMK with AP B that still has lifetime remaining STA sends Reassociation Request to AP B, asserts the “PMK cached” bit, receives Reassociation Response with “PMK cached” bit set (means AP has a PMK for the STA) STA completes 4-way handshake with AP B Bernard Aboba, Microsoft

Pre-Authentication Performance 16 January 2019 Pre-Authentication Performance Maximum velocity (no PMK cached on AP B) v = c/ DTPA DTPA = DTSCAN + DT802.1X + DT4way + DTREASSOC Example: c = 2 ft; DT = 250 ms (fast resume), V=8 ft/sec (5.5 MPH, pedestrian) If STA can learn of alternative APs via other mechanisms (e.g. advertisement over IP), then c ~ D. Maximum velocity (PMK cached on AP B) DTPA = DTSCAN + DT4way + DTREASSOC Example: c = 2 ft; DT = 100 ms, V=20 ft/sec (14 MPH) Server load Do a full authentication for all APs in the roaming set (N) for which a PMK has not been derived and cached Authentication Load = N * V/D (for path with all new APs) Authentication Load = N * V/(D * Tkey) (for path with old APs) Bernard Aboba, Microsoft

Fast Handoff Channel 11 Channel 6 c v D AP B STA AP A 16 January 2019 Fast Handoff Channel 11 Channel 6 c v D AP B STA AP A STA authenticates and associates to AP A on Channel 6 PMK provided to AP B via IAPP or AAA (University of Maryland proposal) STA does passive or active scan, moves, selects AP B as “potential roam” STA authenticates to AP B STA reassociates to AP B Bernard Aboba, Microsoft

Fast Handoff Performance 16 January 2019 Fast Handoff Performance Maximum velocity calculation v = D/DTFH DTFH = Max (DTSCAN, 2RTTAAA) + DT4way + DTREASSOC Example: D = 100 ft, DTSCAN = 40 ms, RTTAAA = 50 ms DT4way = 60 ms, DTREASSOC = 10 ms V = 100 ft/170ms = Mach 0.6! Server load Do a key generation + 2 AAA round-trips for all APs in the neighbor set (M) where cache entry is still valid Key lifetime has a large impact on performance Load multiplied by 2M * V/(D * Tkey) Bernard Aboba, Microsoft

The Problem Space Rate Scan + Pre-auth via Old AP B DT Scan + 16 January 2019 The Problem Space Rate Scan + Pre-auth via Old AP B DT Faster Handoff Association not possible Fast Handoff Scan + Radio tuning c DTPA D DTFH D DTReassoc Stationary Pedestrian Vehicular High Speed Station Velocity Bernard Aboba, Microsoft

Issues with Fast Handoff 16 January 2019 Issues with Fast Handoff Key lifetime Load proportional to reciprocal of key lifetime PMK “generations” AP, STA may need to keep both current and previous PMKs Performance is best if PMKs are not updated until key lifetime expires Reuse the PMK, but rerun 4-way handshake to ensure liveness Works with pre-authentication too (if STA revisits an AP with a cached PMK) Binding attacks With Fast Handoff, key binding attacks are easier to carry out Bernard Aboba, Microsoft

Issues With Fast Handoff (cont’d) 16 January 2019 Issues With Fast Handoff (cont’d) EAP method compatibility PRF used to generate handoff PMKs should not depend on the EAP method Most EAP methods cannot export the MK PMK for fast handoff cannot be calculated from the MK For Perfect Forward Secrecy (PFS), handoff PMK must be computed from a quantity that the AP does not have access to Alternatives: MSK (63,127) (not transmitted to NAS in RFC 2548) Not supported by Diameter EAP Bernard Aboba, Microsoft

TGi Pairwise Key Hierarchy 16 January 2019 TGi Pairwise Key Hierarchy Master Key (MK) Pairwise Master Key (PMK) = MSK(0,31) Pairwise Transient Key (PTK) = EAPoL-PRF(PMK, AP Nonce | STA Nonce | AP MAC Addr | STA MAC Addr) Key Confirmation Key (KCK) – PTK bits 0–127 Key Encryption Key (KEK) – PTK bits 128–255 Temporal Key – PTK bits 256–n – can have cipher suite specific structure Bernard Aboba, Microsoft

Alternative PMK Calculation 16 January 2019 Alternative PMK Calculation Variation on University of Maryland approach PMK generated for an AP only when a full authentication occurs, or key lifetime expires No PMK “generations” Example Formulas PMK0 = MSK (0,31) PMK1-B = Handoff-PRF(MSK(63,95), PMK0,APB-MAC-Addr, STA-MAC-Addr) PMK1-E = Handoff-PRF(MSK(63,95), PMK0,APE-MAC-Addr, STA-MAC-Addr) STA roams to APB: PMK1-B  PMK0 Bernard Aboba, Microsoft

Alternative Synchronization Example 16 January 2019 Alternative Synchronization Example STA roam pattern: AB C D PMKC PMKB PMKD PMKE PMK0A PMKG 1 2 3 4 Generation Bernard Aboba, Microsoft

Binding Attacks With fast handoff, key binding issue becomes critical 16 January 2019 Binding Attacks With fast handoff, key binding issue becomes critical Example attack: NAS impersonation In RADIUS, shared secret is verified based on the Source Address, not the NAS-Identifier, NAS-IPv6-Address or NAS-IP-Address attributes Most proxies don’t check source address against these attributes either Diameter has the Route-Record AVP, but not clear it solves the problem Result A rogue NAS can claim to be any other NAS served by the AAA proxy AAA server cannot verify the NAS identification attributes In fast handoff via AAA, result will be PMK sent to a NAS of the attacker’s choice Bernard Aboba, Microsoft

Solution Key binding Status 16 January 2019 Solution Key binding Addition of NAS & STA Identification attributes to keying attribute packages Addition of anti-replay attributes Nonce? Event-Timestamp Question: do we need CMS keywrap to protect the binding? Status Diameter EAP & NASREQ: vulnerable to attack RFC 2869bis: vulnerable Bernard Aboba, Microsoft

16 January 2019 Recommendations Add a “PMK cached” bit to Association/Reassociation Request/Response Decreases latency and AAA server load Useful for both pre-authentication and fast handoff Reserve (but do not allocate) bits in 4-way handshake May be required to solve “generations” problem Too early to know what form the solution should take Specification can be left until later (maybe another PAR) Bernard Aboba, Microsoft

16 January 2019 Feedback? Bernard Aboba, Microsoft