Postmortem Opinions on LB35/TGi D2.0 Carlos Rios RiosTek LLC

Slides:



Advertisements
Similar presentations
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Advertisements

Doc.: IEEE /360r0 Submission May 2002 Carlos Rios, RiosTek LLC Slide 1 “ARSN” An Adjunct RSN Proposal Carlos Rios RiosTek LLC.
Doc.: IEEE /431r0 Submission July 2002 Carlos Rios, RiosTek LLC Slide 1 Pre-Shared Key RSN Extensions Enrollment, Authentication and Key Management.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Wireless Security Issues Implementing a wireless LAN without compromising your network Marshall Breeding Director for Innovative Technologies and Research.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Chapter Network Security Architecture Security Basics Legacy security Robust Security Segmentation Infrastructure Security VPN.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
2003/12/291 Security Aspects of 3G-WLAN Interworking 組別: 2 組員: 陳俊文 , 李奇勇 , 黃弘光 , 林柏均
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
WEP Protocol Weaknesses and Vulnerabilities
Doc: IEEE /202r1 Submission March 2002 Carlos Rios, RiosTek LLC Slide 1 A Comprehensive, Simplified Alternative RSN Proposal Carlos Rios RiosTek.
Doc.: IEEE /331r1 Submission May 2002 Carlos Rios, RiosTek LLC Slide 1 Postmortem Opinions on LB35/TGi D2.0 Carlos Rios RiosTek LLC.
WLANs & Security Standards (802.11) b - up to 11 Mbps, several hundred feet g - up to 54 Mbps, backward compatible, same frequency a.
IEEE i Aniss Zakaria Survey Fall 2004 Friday, Dec 3, 2004
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
6lowpan ND Optimization draft Update Samita Chakrabarti Erik Nordmark IETF 69, 2007 draft-chakrabarti-6lowpan-ipv6-nd-03.txt.
Wireless Security: The need for WPA and i By Abuzar Amini CS 265 Section 1.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
WLAN Security Condensed Version. First generation wireless security Many WLANs used the Service Set Identifier (SSID) as a basic form of security. Some.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Authentication has three means of authentication Verifies user has permission to access network 1.Open authentication : Each WLAN client can be.
802.11b Security CSEP 590 TU Osama Mazahir. Introduction Packets are sent out into the air for anyone to receive Eavesdropping is a much larger concern.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Addressing Comment #2142 Date Submitted: March, 18, 2008 Presented.
Erik Nicholson COSC 352 March 2, WPA Wi-Fi Protected Access New security standard adopted by Wi-Fi Alliance consortium Ensures compliance with different.
Doc.: IEEE /322r0 Submission May 2002 Jesse Walker et alSlide 1 The Louie Architecture Nancy Cam Winget, Cisco Bob Moskowitz, TruSecure Greg Chesson,
Lecture 7 (Chapter 17) Wireless Network Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Copyright © 2006 Heathkit Company, Inc. All Rights Reserved Introduction to Networking Technologies Wireless Security.
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
Wireless Security - Encryption Joel Jaeggli For AIT Wireless and Security Workshop.
History and Implementation of the IEEE 802 Security Architecture
Understand Wireless Security LESSON Security Fundamentals.
1. Introduction In this presentation, we will review ,802.1x and give their drawbacks, and then we will propose the use of a central manager to replace.
Proposed solutions to comments on section 7
Robust Security Network (RSN) Service of IEEE
History and Implementation of the IEEE 802 Security Architecture
Authentication and Upper-Layer Messaging
“ARSN” An Adjunct RSN Proposal Carlos Rios RiosTek LLC
Wireless Protocols WEP, WPA & WPA2.
Discussions on FILS Authentication
P802.11aq Waiver request regarding IEEE RAC comments
802.1X and key interactions Tim Moore November 2001
Create login screen Decide how you want you log in screen to work. I have 3 examples of different difficulty/approach, but you should have your own ideas.
Motion to Incorporate PSK RSN Extensions into TGi D2
doc.: IEEE xxx Bob Beach Symbol Technologies
Coexistence of Legacy & RSN STAs in Public WLAN
March 2001 Optional MAC-Level Security Enhancements for Home WLANs Carlos Rios LinCom Wireless Carlos Rios, LinCom Wireless.
Proposed Modifications to e-D4.0 Direct Link Protocol
3GPP WLAN Interworking Security Issues
Jul 12, /12/10 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Frame signaling options for Security.
doc.: IEEE /454r0 Bob Beach Symbol Technologies
Antti Miettinen (modified by JJ)
Responses to Clause 5 Comments
Dan Harkins Trapeze Networks
P802.11aq Waiver request regarding IEEE RAC comments
P802.11aq Waiver request regarding IEEE RAC comments
Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget Cisco Systems, Inc
Clause 7 Comment Resolutions
Session MAC Address Solves Deadlocks
TGi Draft 1 Clause – 8.5 Comments
TGi Draft 1 Clause – 8.5 Comments
Presentation transcript:

Postmortem Opinions on LB35/TGi D2.0 Carlos Rios RiosTek LLC

Fundamental TGi Requirements Fix broken 802.11-1999 security mechanisms Fix 1- Firmware-downloadable retrofit for existing legacy equipment Fix 2- State-of-the-art encryption implementable in new generation equipment Incorporate 802.1x/EAPOL-based authentication into 802.11 802.11-1999 authentication does not scale well to very large networks (dozens of access points, hundreds of stations, guest users, etc) Incorporate EAPOL, leverage RADIUS infrastructure already prevalent in enterprise networks

The LB35 TGi (D2.0) Proposal What it Did Well What it Did Badly Created the Robust Security Network (RSN) context, distinct and separate from legacy 802.11-1999 security Incorporated TKIP (for legacy) and AES-OCB (for new equipment) Incorporated 802.1x/EAPOL based Upper Layer Authentication (ULA) What it Did Badly Deprecated all other 802.11-1999 authentication- only 802.1x/ULA would support Enhanced Security/RSN Proposed incomprehensibly complex, unworkable 802.1x/EAPOL based Key Management (Nonce, Group Key distribution) mechanism Left some big holes (fast roaming, multicast/broadcast) What it Didn’t Do at All Address Authentication for (non-AS provisioned) IBSS and Simple BSS Address Key Management for non-802.1x/EAPOL provisioned WLANs

And, unsurprisingly, LB35 was resoundingly rejected The Consequences RSN Functionality Editorial Commentary Strong Privacy Good TKIP and AES-OCB constructs, with improvements still coming (i.e., explicit 48 bit IVs) Authentication, given AS Full 802.1x and EAPOL support Authentication, non-AS None Key Management Incomprehensibly complex and unworkable Multicast/Broadcast Messaging protocols undefined, so what to do? Roaming Requires full (500ms?) 802.1x Authentication Comprehensive Solution Nope Large BSS Deployment Great Privacy, Authentication; Poor Messaging, Roaming SOHO BSS Deployment No AS=> No Authentication=> No Enhanced Security IBSS And, unsurprisingly, LB35 was resoundingly rejected

So, What now? D2.x- The son of D2.0 Authentication, Key Management supported uniquely by 802.1x rev ? Such an incarnation does not yet exist, is being made up as we go along We’ve been provided with incomprehensible updates periodically since Sept 01 Only the authors understand it, but they built it and could not make D2.0 work Now, 02/298 is the “completely new and different” operative substance for D2.x 02/298 is also incomprehensible. Whatever it is, I can’t build to it. It’s Sept 01 again. Except now I cannot blindly accept 02/298 as the UNIQUE basis for a solution. I’m not alone, and any LB derived solely from 02/298 will also be rejected This is clearly NOT a path to a standard any time soon Louie- The culmination of WLAN Security “Compleat Security Server” strips all security functionality from 802.11 Intriguing idea, but not even minimally baked yet D2.x should probably evolve into Louie Sounds comprehensive and probably robust, but certainly not timely Might make for a good standard someday

How about another approach? “ARSN, An Adjunct RSN”, 11-02-360r1-I Starts from 802.11-1999 and D2.0 Incorporates TKIP and AES-OCB privacy mechanisms Incorporates 802.1x/ULA authentication to support AS- provisioned networks Incorporates parallel “robust shared key authentication” for IBSS and Home WLANs, works alongside 802.1x/ULA for AS-provisioned networks Minimalist 802.11-1999 authentication fix- uses TKIP/AES for challenge/response Provides needed IBSS, simple BSS authentication mechanisms missing in D2.0 An optional solution for all us 802.1x/AS-deprived folk Incorporates parallel MAC-level mechanisms to support Key Management, Unicast and Multicast/Broadcast messaging, etc., in non-802.1x contexts Minimal modifications of existing 802.11-1999 management frames provide a full key management and messaging protocol for non EAPOL provisioned WLANs Can also support ULA networks in the interim, until EAPOL based key management and messaging is well-defined, finalized, working and stable. Again, an optional solution for us 02/298-challenged folk Incorporate fast roaming using IAPP to transport key material between APs This approach is comprehensive, robust and timely

What ARSN Provides RSN Functionality Editorial Commentary Strong Privacy Good TKIP and AES-OCB constructs, with improvements still coming (i.e., explicit 48 bit IVs) Authentication, given AS Full 802.1x and EAPOL support Authentication, non-AS TKIP/AES challenge/response adequate for IBSS, Home Key Management MAC based protocols hold the fort, perhaps only until EAPOL based Key Management is ready for prime time Multicast/Broadcast MAC based protocols hold the fort, perhaps only until EAPOL based messaging protocols are ready for prime time Roaming 20 ms max fast handoff Comprehensive Solution Yes Large BSS Deployment Excellent Authentication, Privacy, Messaging, Roaming SOHO BSS Deployment Acceptable Authentication, Privacy, Messaging, Roaming IBSS Acceptable Authentication, Privacy, Messaging

Motivation for ARSN D2.0 failed to provide an Enhanced WLAN Security solution acceptable to the full 802.11 membership D2.x is more of the same, and likewise will never get to sponsor ballot Louie sounds great, but Takes complexity to a much higher level Looks like a high cost adder throughout (Need a Louie server in every station!!) Won’t be ready anytime soon ARSN will provide a timely, workable (and perhaps) interim solution for RSN security Incorporates TKIP, AES-OCB and 802.1x/ULA Makes small mods to 802.11-1999 to produce a necessary and sufficient security fix ARSN text is readable, comprehensible and eminently critique-able, and runs 14 pages ARSN is structured to allow incorporation of D2.x and/or Louie protocols as these are defined, verified, finalized and stabilized. We get something that will work acceptably now (2002), and can keep on working to improve it

And, Let’s Speak Frankly The industry, and some of our bosses, have been screaming for a “WEP Fix” for about a year now TGi has been spectacularly unsuccessful in producing one Somewhere along the line, said WEP Fix has picked up baggage that is now effectively precluding its completion and adoption: “802.1x is the unique mechanism for RSN Authentication and Key Management” 802.1x-unique Authentication disenfranchises the IBSS and simple BSS from Enhanced Security D2.0 802.1x-unique Key Management DID NOT WORK The latest “completely different” version is also incomprehensibe There is NO reason to assume this version will work either As long as the WEP Fix carries this baggage it will never pass One resolution is to ditch the 802.1x-only pony and allow alternative optional solutions that avoid these problems. ARSN is one of many possible such solutions, and I urge the Task Group to provide it, and any others, the crucially important consideration they merit.