Security Activities in IETF in support of Mobile IP

Slides:



Advertisements
Similar presentations
Unlicensed Mobile Access (UMA) Dasun Weerasinghe School of Engineering and Mathematical Sciences City University London.
Advertisements

Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
Mobile IP in Wireless Cellular Systems from several perspectives Charles E. Perkins Nokia Research Center.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
SIPPING IETF51 3GPP Security and Authentication Peter Howard 3GPP SA3 (Security) delegate
IEEE Wireless Local Area Networks (WLAN’s).
1 © 1999, Cisco Systems, Inc. AAA/Mobile IP For 3G CDMA Systems Gopal Dommety and Allen Long.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
1 cdma2000 Packet Data Security Assessment Christopher Carroll Verizon Wireless April 11, 2001.
1 Motorola PMIPv4 Call Flows: Bearer Setup with Dual Anchoring Parviz YeganiVojislav VuceticAlmon Tang (408) (732) (847)
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
1 A VPN based approach to secure WLAN access John Floroiu
Doc.: IEEE /635r1 Submission November 2001 Peter A. Dahl, Verizon WirelessSlide 1 CDMA2000 [the other 3G Standard] Peter Dahl Verizon Wireless.
IETF WG Presentation1. IETF WG Presentation2 General Description This group develops or adopts architectures and protocols to support mobility inside.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
March 17, 2003 IETF #56, SAN FRANCISCO1 Compound Authentication Binding Problem (EAP Binding Draft) Jose Puthenkulam Intel Corporation (
Santhosh Rajathayalan ( ) Senthil Kumar Sevugan ( )
1 HRPD Roamer Authentication Zhibi Wang, Sarvar Patel, Simon Mizikovsky, Nancy Lee.
Doc.: IEEE /345r0 Submission May 2002 Albert Young, Ralink TechnologySlide 1 Enabling Seamless Hand-Off Across Wireless Networks Albert Young.
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
Paris, August 2005 IETF 63 rd – mip6 WG Mobile IPv6 bootstrapping in split scenario (draft-ietf-mip6-bootstrapping-split-00) mip6-boot-sol DT Gerardo Giaretta,
MIPv4-Diameter Update Tom Hiller Lucent Technologies.
Mobile IP Security Konidala M. Divyan International Research Center for Information Security Network Security (ICE 615) Term Project – 2002 Autumn.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
Computer and Network Security
Authors: Jiang Xie, Ian F. Akyildiz
<draft-ohba-pana-framework-00.txt>
Informing AAA about what lower layer protocol is carrying EAP
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
Microsoft Windows NT 4.0 Authentication Protocols
Mobile Networking (I) CS 395T - Mobile Computing and Wireless Networks
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
CSE 4905 IPsec II.
IS-IS WG IS-IS Cryptographic Authentication Requirements
Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-01.txt)
Carrying Location Objects in RADIUS
for IP Mobility Protocols
Note Well Any submission to the IETF intended by the Contributor for publication as all or part of an IETF Internet-Draft or RFC and any statement made.
Introduction to Wireless Networking
Discussions on FILS Authentication
BINF 711 Amr El Mougy Sherif Ismail
Handover Keys Using AAA (draft-vidya-mipshop-handover-keys-aaa-03.txt)
SECMECH BOF EAP Methods
2002 IPv6 技術巡迴研討會 IPv6 Mobility
Securing Access to Mobile Operator Core Networks using IKEv2
Secure Authentication System for Public WLAN Roaming
CS 465 TLS Last Updated: Oct 31, 2017.
3GPP2-WLAN Interworking update
Agenda retrospective - B. Aboba Lunch
Mobile IP Presented by Team : Pegasus Kishore Reddy Yerramreddy Jagannatha Pochimireddy Sampath k Bavipati Spandana Nalluri Vandana Goyal.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Liaison Report Date Submitted: March 18, 2010 Presented at IEEE session.
IEEE MEDIA INDEPENDENT HANDOVER DCN: sec
Roaming timings and PMK lifetime
802.11i Bootstrapping Using PANA
Mobile IP Regional Registration
IEEE IETF Liaison Report
Roaming timings and PMK lifetime
3GPP2-WLAN Interworking update
IETF Liaison Report January 2004 Dorothy Stanley – Agere Systems
Presentation transcript:

Security Activities in IETF in support of Mobile IP Semyon (Simon) Mizikovsky Lucent Technologies, Inc. Lucent Technologies Bell Labs Innovations

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 What is Mobile IP? Mobile IP becomes front-end for AAA Home AAA Server AAA Server Broker Network HA First Visited Network FA Internet MIP Tunnel FA Next Visited Network AAA ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

Mobile IP and User Authentication Challenge/Response authenticated with AAA infrastructure (RFC 3012bis) Visited AAA Server Home AAA Server Broker Network MN FA HA MIP Advertisement (Challenge) MIP Registration ReQuest (AUTHm) AAA Authentication/Authorization Request AAA Authorization Response (AUTHh) MIP RRQ MIP RRP (AUTHh) MIP RRP ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 Mobile IP Keys Home AAA Server AAA Server Corporate Network Broker Network HA MN Dynamic MIP Tunnel Protected by IPSec FA Internet MN-AAAh Key MN-HA Key FA-HA Key MN-FA Key ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

Mobile IP Keys Description K1 = MN-AAAh_Key Pre-provisioned Long Term Root Key K2 = MN-HA_key Supports dynamic allocation of HA, even in visited network. Intermediate Term. Used to authenticate subsequent registrations from different FAs during same session K3 = FA-HA_key Used to authenticate control messages Could also protect bearer traffic Could be used as the key for IPSec K4 = MN-FA_key Could be used as input for link-layer (Air Interface) security. ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

Current IETF Mobile IP Drafts Mobile IP Authentication RFC3012bis Mutual MN-AAAh Authentication Mobile IP Key Distribution AAA Key Distribution Extensions to RFC3012 http://www.ietf.org/internet-drafts/draft-ietf-mobileip-aaa-key-09.txt Not interlocked with Authentication EAP-AKA http://www.ietf.org/internet-drafts/draft-arkko-pppext-eap-aka-00.txt Mutual MN-AAAh Authentication and Key Generation Requires maintaining states in FA, HA, and AAAh. ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

EAP Shared Key Exchange (SKE) draft- salgarelli- pppext- eap- ske- 01 EAP Shared Key Exchange (SKE) draft- salgarelli- pppext- eap- ske- 01. txt

SKE – Abstract and Rationale Combined Mutual Authentication and Key Generation scheme based on EAP. Applicable to 802.11, Cdma2000, UMTS, and other mobile technologies. Optimized for efficiency to support roaming clients. Minimal number of messages exchanged between Mobile Node (Client) and Authenticator. Only 1 Round Trip Transaction to the AAAh required to complete authentication and session key generation. Supports evolution towards 1- pass authentication for Mobile- IP enabled clients. Uses cryptographically strong MN-AAAh Key. Resistant to Dictionary Attacks. SKE is cipher-suite - independent. The EAP Master Secret Key (K_ EMS) is derived as the result of successful process. All session keys can be derived from it depending on specific cipher application. ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 EAP SKE Initiation ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 EAP SKE Completion ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 Mobile IP SKE Variant ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 Mobile IP SKE Variant ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 SKE Functions Authentication Responses of MN (Am), AAAh (Ah), and FA (Af) are Secure MACs of pre-shared keys, respective Challenges (Nf, Nm, Nh), and MN Identity (NAI). Am = MAC (MN-AAAh_KEY | Nf | Nm | NAI) Ah = MAC (MN-AAAh_KEY | Nm | Nf | NAI) Af = MAC (FA-HA_Key | Nf | Nh | NAI) EAP Master Secret Key (K_EMS) is a Secure Pseudo-Random Function of MN-AAAh_Key, AAAh Challenge (Nh), and Auth response of the AAAh (Ah). K_EMS = PRF (MN-AAAh_KEY | Nh | Ah) Other keys are generated from K_EMS. MN-FA_Key = PRF (K_EMS|Nm|Nf) MN-HA_Key = PRF (K_EMS|Nm|Nh) FA-HA_Key = PRF (K_EMS|Nf|Nh) Standard Key-Explosion functions can be used HMAC-SHA1, PRF-SHA1, HMAC-MD5, etc. ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 SKE Properties Secrecy and Authenticity Home AAA and MN Authenticate each-other. EAP Master Secret Key (K_EMS) guaranteed to be fresh, random, and unique (Derived from Nf, Nm, and Nh), Key Generation interlocked with Authentication. Forward secrecy Compromise of K-EMS preserves security of past and future sessions and secrecy of the root key (MN-AAAh_Key). Efficiency Minimum number of Air Interface messages. Only 1 Round Trip Transaction with AAAh. Provably Secure Stateless protocol (as opposed to EAP-AKA) ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019

ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 Summary Even though Mobile IP Authentication is Mandatory, the Key Generation and Distribution is not. There are few Key Generation and Key Distribution schemes – neither is adopted by IETF yet. All require change in AAA operation. RADIUS specs are closed, DIAMETER specs are not mature. SKE is an example of efficient and secure Authentication & Key Generation Protocol optimized for mobile environment, including 802.x, 3GPP UMTS, 3GPP2 Cdma2000, etc. ITU-T Workshop on Security - Seoul (Korea), 13-14 May 2002 23.04.2019