Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
CN8816: Network Security 1 Security in Wireless LAN i Open System Authentication Security Wired Equivalent Privacy (WEP) Robust Security Network.
Analysis of the i 4-Way Handshake Changhua He, John C Mitchell 2004 ACM International Workshop on Wireless Security (WiSe'04) Sang-Rok Kim Dependable.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
MIS Week 12 Site:
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
1 IEEE i Overview v0.1 Summary by Uthman Baroudi Nancy Cam-Winget, Cisco Systems Tim Moore, Microsoft Dorothy Stanley, Agere Systems Jesse Walker,
IWD2243 Wireless & Mobile Security Chapter 3 : Wireless LAN Security Prepared by : Zuraidy Adnan, FITM UNISEL1.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
Doc.: IEEE /0039r0 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE /0707r0 Submission July 2003 N. Cam-Winget, et alSlide 1 Establishing PTK liveness during re-association Nancy Cam-Winget, Cisco Systems.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Shambhu Upadhyaya Security – Key Hierarchy Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 11)
Csci388 Wireless and Mobile Security – Key Hierarchies for WPA and RSN
Doc.: IEEE /008r0 Submission January 2003 N. Cam-Winget, D. Smith, K. AmannSlide 1 Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
1 /24 May Systems Architecture WPA / WPA 2(802.11i) Burghard Güther, Tim Hartmann
Module 48 (Wireless Hacking)
Robust Security Network (RSN) Service of IEEE
CSE 4905 WiFi Security II WPA2 (WiFi Protected Access 2)
WiFi Troubleshooting & Performance Monitoring
Re-evaluating the WPA2 Security Protocol
Advanced Penetration testing
“ARSN” An Adjunct RSN Proposal Carlos Rios RiosTek LLC
Lecture 29 Security in IEEE Dr. Ghalib A. Shah
Some LB 62 Motions January 13, 2003 January 2004
Keying for Fast Roaming
802.1X and key interactions Tim Moore November 2001
Chapter 24 Wireless Network Security
TGi Motions for Comment Resolution
Motions to Address Some Letter Ballot 52 Comments
TGai FILS Authentication Protocol
Mesh Security Proposal
Nancy Cam-Winget, Cisco Systems Inc
Wireless Network Security
Use of EAPOL-Key messages during pre-auth
PEKM (Post-EAP Key Management Protocol)
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Just-in-time Transition Setup
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Nancy Cam-Winget, Cisco Systems Inc
802.1X/ Issues Nancy Cam-Winget, Cisco Systems
doc.: IEEE /252 Bernard Aboba Microsoft
Jesse Walker and Emily Qi Intel Corporation
TAP (Transition Acceleration Protocol)
Roaming Keith Amann, Spectralink
Tim Moore, Microsoft Corporation Clint Chaplin, Symbol Technologies
Fast Roaming Compromise Proposal
Options for Protecting Management Frames
Roaming timings and PMK lifetime
WLAN Extended Multicast for TGu
EAPOL-Key Clarifications
Fast Roaming Compromise Proposal
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Fast Roaming Compromise Proposal
Dan Harkins Trapeze Networks
Roaming timings and PMK lifetime
Keying for Fast Roaming
Use of EAPOL-Key messages
Sept 2003 PMK “sharing” Tim Moore Tim Moore, Microsoft.
Submission Title: Dallas i/ Liaison Report.
Roaming timings and PMK lifetime
Group Key Optimizations
11ay Fast Association Authentication
11ay Fast Association Authentication
Presentation transcript:

Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc September 2002 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc Moore, Roshan, Cam-Winget

Phase 1 – Finding and Associating to an AP September 2002 Phase 1 – Finding and Associating to an AP Client AP Probe Request Probe Response + RSN IE (AP supports MCast/Ucast: WEP, TKIP and Auth: Dynamic Keys with 802.1X) 802.11 Open Authentication 802.11 Open Auth (success) Association Req + RSN IE (Client requests TKIP and dynamic keys with 802.1X) Association Response (success) 802.1X controlled port blocked for client AID Moore, Roshan, Cam-Winget

Phase 2 – Authenticating the User September 2002 Phase 2 – Authenticating the User AAA Client AP 802.1X/EAP-Request Identity 802.1X/EAP-Response Identity (EAP type specific) RADIUS Access Request/Identity EAP type specific mutual authentication Derive Pairwise Master Key (PMK) Derive Pairwise Master Key (PMK) RADIUS ACCEPT (with PMK via MS-MPPE) 802.1X/EAP-SUCCESS 802.1X controlled port still blocked for client AID Moore, Roshan, Cam-Winget

Deriving the Pairwise (Unicast) Keys September 2002 Deriving the Pairwise (Unicast) Keys SNonce – Supplicant or STA Nonce ANonce – Authenticator or AP Nonce STA and AP must have a master key (PMK or PSK) Moore, Roshan, Cam-Winget

The Pairwise Key Hierarchy September 2002 The Pairwise Key Hierarchy Min(STA MAC, AP MAC) || Max(STA MAC, AP MAC) || SNonce || ANonce PMK String “Pairwise Key Expansion” NOTE: Values are concatenated, so order matters PRF-512 512 bit Pairwise Transient Key (PTK) Moore, Roshan, Cam-Winget

The Pairwise Key Hierarchy September 2002 The Pairwise Key Hierarchy 512 bit Pairwise Transient Key (PTK) EAPoL-Key MIC Key 128 bits EAPoL-Key Encryption Key 128 bits Temporal Encryption Key 128 bits Temporal AP Tx MIC Key 64 bits Temporal AP Rx MIC Key 64 bits Bits 0-127 Bits 128-255 Bits 256-383 Bits 384-447 Bits 447-511 NOTE: The Tx MIC key is used by the station with the lower MAC address value The Rx MIC key is used by the station with the higher MAC address value Moore, Roshan, Cam-Winget

Phase 3 – The Four Way Handshake September 2002 Phase 3 – The Four Way Handshake Client AP * Fields not noted are null PMK PMK Derive SNonce Derive ANonce EAPoL-Key(Reply Required, Unicast, ANonce) Derive PTK EAPoL-Key(Unicast, SNonce, MIC, STA RSN IE) Derive PTK EAPoL-Key(Reply Required, Install PTK, Unicast, ANonce, MIC, AP RSN IE) Install Keys Install Keys EAPoL-Key(Unicast, ANonce, MIC) 802.1X controlled port still blocked for client AID Moore, Roshan, Cam-Winget

Deriving the Group Keys September 2002 Deriving the Group Keys Group Master Key Generation Derived from a random number Set to the first PMK (Optional, but not recommended) Must be updated periodically from another PMK Must be updated when the PMK source STA’s association state is purged. GNonce – Group nonce generated by AP Moore, Roshan, Cam-Winget

The Group Key Hierarchy September 2002 The Group Key Hierarchy AP MAC || GNonce GMK String “Group Key Expansion” PRF-256 NOTE: Values are concatenated, so order matters 256 bit Group Transient Key (GTK) Moore, Roshan, Cam-Winget

The Group Key Hierarchy September 2002 The Group Key Hierarchy 256 bit Group Transient Key (GTK) Temporal Encryption Key 128 bits Temporal AP Tx MIC Key 64 bits Temporal AP Rx MIC Key 64 bits Bits 0-127 Bits 128-191 Bits 192-255 NOTE: The Tx MIC key is used by the station with the lower MAC address value The Rx MIC key is used by the station with the higher MAC address value Moore, Roshan, Cam-Winget

Phase 4 – The Group Key Update September 2002 Phase 4 – The Group Key Update Client AP * Fields not noted are null GMK Derive GNonce Derive GTK Encrypt GTK field EAPoL-Key(All Keys Installed, Reply Required, Group Rx, Key Index, Group, GNonce, MIC, GTK) Decrypt GTK field EAPoL-Key(Group, MIC) 802.1X controlled port unblocked for client AID Moore, Roshan, Cam-Winget