Bootstrapping Key Infrastructure over EAP draft-lear-eap-teap-brski

Slides:



Advertisements
Similar presentations
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
Advertisements

CONFIDENTIAL © Copyright Aruba Networks, Inc. All rights reserved AOS & CPPM INTEGRATION CONFIGURATION & TESTING EAP TLS & EAP PEAP by Abilash Soundararajan.
Secure Network Bootstrapping Infrastructure May 15, 2014.
TCG Confidential Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 TNC EAP IETF EAP.
9,825,461,087,64 10,91 6,00 0,00 8,00 SIP Identity Usage in Enterprise Scenarios IETF #64 Vancouver, 11/2005 draft-fries-sipping-identity-enterprise-scenario-01.txt.
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
COS 420 DAY 22. Agenda Assignment 4 Corrected 2 B’s Assignment 5 posted Chap Due May 4 Final exam will be take home and handed out May 4 and Due.
Bootstrapping Key Infrastructures Max Pritikin IETF 91, 10 Nov 2014 Aloha!
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Eugene Chang EMU WG, IETF 70
Registration Processing for the Wireless Internet Ian Gordon Director, Market Development Entrust Technologies.
1 EAP Usage Issues Feb 05 Jari Arkko. 2 Typical EAP Usage PPP authentication Wireless LAN authentication –802.1x and i IKEv2 EAP authentication.
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
1 DHCP Authentication Discussion INTAREA meeting, 70th IETF Vancouver, Canada Jari Arkko and Ralph Droms.
draft-ietf-netconf-zerotouch
Welcome Windows Server 2008 安全功能 -NAP. Network Access Protection in Windows Server 2008.
Insert Your Name Insert Your Title Insert Date Client Registration Open Issues Update 5/27/2011 Denis Pochuev (original proposal by Alan Frindell)
Some use cases and requirements for handover Information Services Greg Daley MIPSHOP Session IETF 64.
SOCKS By BITSnBYTES (Bhargavi, Maya, Priya, Rajini and Shruti)
DTI Mission – 29 June LCG Security Ian Neilson LCG Security Officer Grid Deployment Group CERN.
1 Trusted Transitive Introduction Max Pritikin (Presentation by Cullen Jennings) Revision A.
Port Based Network Access Control
Anima IETF 93 draft-pritikin-anima-bootstrapping- keyinfra-02 Design Team Update.
IEEE SISWG (P1619.3)‏ Messaging & Transport. AGENDA Transport Protocols & Channel Protection Messaging Layer Capability Exchange & Authentication Groups.
Thoughts on Bootstrapping Mobility Securely Chairs, with help from James Kempf, Jari Arkko MIP6 WG/BOF 57 th IETF Vienna Wed. July 16, 2003.
Bootstrapping Key Infrastructures
Draft-kwatsen-netconf-zerotouch-00 Zero Touch Provisioning for NETCONF Call Home.
What’s New in Fireware v
Instructor Materials Chapter 8: DHCP
6tisch security design team: progress since Toronto
Data Virtualization Tutorial… SSL with CIS Web Data Sources
Module 9: Configuring Network Access
<draft-ohba-pana-framework-00.txt>
Booting up on the Home Link
Firewall Issues Research Group GGF-15 Oct Boston, Ma Leon Gommans - University of Amsterdam Inder Monga - Nortel Networks.
Module Overview Installing and Configuring a Network Policy Server
draft-ietf-simple-message-sessions-00 Ben Campbell
Katrin Hoeper Channel Bindings Katrin Hoeper
A Reference Model for Autonomic Networking draft-ietf-anima-reference-model-03.txt 97th IETF, Nov 2016 Michael Behringer (editor), Brian Carpenter, Toerless.
Configuring and Troubleshooting Routing and Remote Access
TGaq Service Transaction Protocol for ANDSF Discovery Service
ERP extension for EAP Early-authentication Protocol (EEP)
Overview of E2E Security CRs
Chapter 10: DHCP Routing & Switching Chapter 10: DHCP
BRSKI overview and issues
WAP Public Key Infrastructure
2018 Real Cisco Dumps IT-Dumps
Free Exam | Questions | braindumps
On and Off Premise Secure Access
Secure Authentication System for Public WLAN Roaming
OMA – SUPL Security SUPL 1.0 has reliable security for H-SLP non-emergency location of a SET 3GPP solution 1: GBA (Generic Bootstrap Architecture) support.
Nancy Cam-Winget, Cisco Systems Inc
LXI Security Overview October 2018 Rev 1.8.
YANG model for ANI IETF101 draft-eckert-anima-enosuchd-raft-yet-99
Wednesday, 9:30-12:00 Morning session I, Van Horne
ACTORS DESCRIPTION PNF
Recap At IETF 97 we presented the Voucher document for the first time as an ANIMA draft Bootstrapping Design team has met weekly since, about 50% discussion.
Link Setup Flow July 2011 Date: Authors: Name Company
Performance Analysis of authentication and authorization
IEEE MEDIA INDEPENDENT HANDOVER
draft-eckert-anima-noc-autoconfig-00 draft-eckert-anima-grasp-dnssd-01
Zero Touch Provisioning for NETCONF/RESTCONF Call Home draft-ietf-netconf-zerotouch-19 NETCONF WG IETF 100 (Singapore)
Application Layer TLS draft-friel-tls-atls-00
IoT Onboarding for Date: Authors: November 2018
draft-friel-acme-integrations
Tuesday (July 23rd, 2019) Two sessions ( minutes)
ANIMA recharter IETF 103 Bangkok
Update on BRSKI-AE – Support for asynchronous enrollment
ONAP-to-Edge Secure site reachability
Presentation transcript:

Bootstrapping Key Infrastructure over EAP draft-lear-eap-teap-brski E. Lear, O. Friel, N. Cam-Winget Cisco

draft-friel-brski-over-802dot11 Related Draft BRSKI over IEEE 802.11 draft-friel-brski-over-802dot11 O. Friel, E. Lear, M. Pritikin cisco M. Richardson Sandelman Software Works

What problems are we trying to solve? Network A What Wi-Fi networks support BRSKI? How to avoid the device onboarding against the wrong network? What credentials does the device use before and after BRSKI bootstrap against a Wi-Fi network? How long does it take / what signalling is required for the device to determine that the network is untrusted? How complicated is the device state machine when switching from candidate network A to candidate network B? How complicated is the device state machine during network onboarding? ? Network B Network C draft-friel-brski-over-802dot11 outlines some possible solutions but does not make any final recommendations draft-lear-eap-teap-brski focuses on one candidate solution: running BRSKI inside a TEAP tunnel

Refresher: ANIMA BRSKI 1a. SIGP(requestvoucher) 1b. SIGR(SIGP(requestvoucher)) Pledge Registrar MASA 1d. SIGM(voucher) 1c. SIGM(voucher) 2a. simpleenroll + CSR EST RA 2b. Sign CSR CA 2c. LDevID Bootstrapping pledge trusts nothing except the manufacturer Pledge discovers registrar service on local domain (GRASP, mDNS, DNS options) Registrar is akin to a smart middlebox that proxies voucher requests to a manufacturer service that the device trusts Manufacturer issues a signed voucher instructing the pledge to trust the registrar

What we could do with current mechanisms 1. 802.11 connect and 802.1X using IDevID Network A 2. DHCP, IP, DNS 3. Reject Network A 3. BRSKI Voucher Request / Reject MASA 4. Reboot 5. 802.11 connect and 802.1X using IDevID 6. DHCP, IP, DNS Network B 7. BRSKI Voucher Request / Accept 7. Voucher Network B 8. Reboot 9. 802.11 connect and 802.1X using LDevID 10. DHCP, IP, DNS 11. Access resources

What we would like to do MASA Network A Network B 1. 802.11 connect and 802.1X using IDevID with BRSKI messages tunnelled inside EAP TLS tunnel Network A 1. Reject Network A MASA 2. 802.11 connect and 802.1X using IDevID with BRSKI messages tunnelled inside EAP TLS tunnel 3. DHCP, IP, DNS Network B 2. Voucher Network B 4. Access resources

ANIMA BRSKI Provisional TLS connection to Registrar Establish Trust via Voucher Verify TLS connection Download Trust Anchors Enrol to get a cert

EAP-TEAP is a good fit Provisional TLS connection to Registrar Establish Trust via Voucher Verify TLS connection Download Trust Anchors Enrol to get a cert TEAP supports Server Unauthenticated Provisioning New TLVs can be transported in TLS tunnel Device can verify server after TEAP Phase 2 completes Trusted-Server-Root TLV exists PKCS#7 and PKCS#10 TLVs exist

EAP-TEAP BRSKI Architecture TEAP server and BRSKI Registrar could be co-located BRSKI Registrar and CA could be co-located

EAP-TEAP BRSKI Flow New TEAP TLVs defined VoucherRequest Voucher VoucherStatus* EnrollmentStatus* CSR-Attributes* BRSKI TLVs must be exchanged prior to Crypto-Binding BRSKI is not a new EAP Method BRSKI exchange is not an inner method No need for Channel-Binding * Usage shown in detailed flows in draft

Summary Running BRSKI as part of 802.1X simplifies device onboarding state machine EAP TEAP is a good fit for BRSKI Defining new TEAP TLVs vs. a new EAP method seems simpler Request EMU adoption for draft-lear-eap-teap-brski

Discussion