TGai FILS Authentication Protocol

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /1281r1 Submission NameAffiliationsAddressPhone Robert Sun;Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /1160r1 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA +1
Doc.: IEEE /1436r0 Submission NameAffiliationsAddressPhone Robert Sun Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /0780r1 Submission NameAffiliationsAddressPhone Ping Fang Zhiming Ding Phillip Barber Rob Sun Huawei Technologies Co., Ltd. Bldg.
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
Doc.: IEEE /0041r1 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li; Edward Au; Phillip Barber Huawei Technologies Co., Ltd.
Doc.: IEEE /0567r1 Submission May 2012 Huawei Slide 1 Multiple Frequency Channel Scanning Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE ai May 2012 InterDigital, KDDI, Nokia, Huawei, Intel, Qcomm Slide 1 Proposed SFD Text for ai Passive Scanning.
Doc.: IEEE /0976r1 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0976r3 Submission July 2011 Hitoshi Morioka, ROOT INC.Slide 1 TGai Authentication Protocol Proposal Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1169r1 Submission January 2012 Jihyun Lee, LG ElectronicsSlide 1 FILS Association Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /933r6 Submission July 2012 Fang Xie (CMCC)Slide 1 Access Control Mechanism for FILS Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1042r3 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /1042 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Doc.: IEEE /0249r0 Submission March 2012 Slide 1Lin Cai et al,Huawei. Differentiated Association Service Provisioning in WiFi Networks Date: 03/02/2012.
IEEE MEDIA INDEPENDENT HANDOVER DCN: srho
Doc.: IEEE /0039r0 Submission NameAffiliationsAddressPhone Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei.
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Submission doc.: IEEE 11-11/1414r2 November 2011 Katsuo Yunoki, KDDI R&D LaboratoriesSlide 1 Probe Request and Response in TGai Date: Authors:
Doc.: IEEE /0067r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Active Scanning Time Notification Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Submission doc.: IEEE ai March 2012 InterDigital, KDDI, Nokia, Huawei, IntelSlide 1 Proposed SFD Text for ai Passive Scanning Improvement.
Doc.: IEEE /0897r0 SubmissionJae Seung Lee, ETRISlide 1 Active Scanning considering Operating Status of APs Date: July 2012.
Doc.: IEEE /551r0 Submission September 2002 Moore, Roshan, Cam-WingetSlide 1 TGi Frame Exchanges Tim Moore Microsoft Pejman Roshan Nancy Cam-Winget.
Doc.: IEEE / ai Submission Nov 2011 Huawei Technologies Co. LtdSlide 1 Broadcast Probe Response in TGai Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0061r1 SubmissionJae Seung Lee, ETRISlide 1 Probe Response frame transmission interval Date:
Doc.: IEEE /0547r1 Submission May 2012 Dapeng Liu, China MobileSlide 1 Extend 802.1X for higher layer configuration in FILS Date:
Doc.: IEEE /0158r2 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /01047r2 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Doc.: IEEE /1233r3 Submission Sep 2011 Slide 1 Passive Scanning Improvement Date: Authors:
Submission doc.: IEEE ai September 2012 Lei Wang, InterDigital CommunicationsSlide 1 Ad Hoc Discussions of ai Passive Scanning during.
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Doc.: IEEE /1042r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /0275r3 Submission March 2012 Hitoshi Morioka, Allied Telesis R&D CenterSlide 1 Higher Layer Configuration Function for TGai SFD Date:
Doc.: IEEE /1281r1 Submission NameAffiliationsAddressPhone Robert Sun;Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata,
Doc.: IEEE /278r0 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /0080r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 AP Admission Control in TGai Date: Authors: NameAffiliationsAddressPhone .
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /0568r0 Submission May 2012 Young Hoon Kwon, Huawei Slide 1 AP Discovery Information Broadcasting Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /657r0 Submission August 2003 N. Cam-WingetSlide 1 TGi Draft 5.0 Comments Nancy Cam-Winget, Cisco Systems Inc.
Submission doc.: IEEE ai May 2012 InterDigital Slide 1 Passive Scanning Improvement Ad Hoc Report Date: Authors:
Submission doc.: IEEE 11-12/1051r2 Multi-channel information for AP discovery 1 September 2012 HTC Corp. NameAffiliationsAddressPhone Jing-Rong HsiehHTC.
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Doc.: IEEE /01047r4 Submission NameAffiliationsAddressPhone Ping Fang Huawei Technologies Co., Ltd. Bldg 7, Vision Software Park, Road Gaoxin.
Doc.: IEEE /1426r00 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi- tech District,
Doc.: IEEE /0158r0 Submission Jan 2012 Phillip Barber, HuaweiSlide 1 Proposed Additions to SFD Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Doc.: IEEE /0269r1 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District, Chengdu,
Month Year doc.: IEEE yy/xxxxr0 May 2012
AP discovery with FILS beacon
Some LB 62 Motions January 13, 2003 January 2004
FILS presentation on High Level Security Requirements
EAP based Message Flow Optimization for FILS
TGai FILS Authentication Protocol
AP discovery with FILS beacon
AP discovery with FILS beacon
AP discovery with FILS beacon
AP Status Broadcast Date: Authors: November 2011
Access Control Mechanism for FILS
Performance Analysis of authentication and authorization
Month Year doc.: IEEE yy/xxxxr0 May 2012
11ay Fast Association Authentication
11ay Fast Association Authentication
Presentation transcript:

TGai FILS Authentication Protocol Month Year doc.: IEEE 802.11-yy/xxxxr0 Jan 2012 TGai FILS Authentication Protocol Date: 2011-11-15 Authors: Name Affiliations Address Phone email Robert Sun; Yunbo Li Edward Au; Phil Barber Junghoon Suh; Osama Aboul-Magd Huawei Technologies Co., Ltd. Suite 400, 303 Terry Fox Drive, Kanata, Ontario K2K 3J1 +1-613-2871948 Rob.sun@huawei.com Paul Lambert Yong Liu Marvell Semiconductor 5488 Marvell Lane Santa Clara, CA 95054 + 1-650-787-9141 paul@marvel.com Lei Wang Interdigital 781 Third Ave, King of Prussia, PA +1-858-205-7286 leiw@billeigean.com Chengyan Feng, Bo, Sun ZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District, Chengdu, China +86-28-85342869 feng.chengyan@zte.com.cn Rob Sun etc, Huawei. John Doe, Some Company

Abstract Dec 2011 Month Year doc.: IEEE 802.11-yy/xxxxr0 Huawei. John Doe, Some Company

Conformance w/ TGai PAR & 5C April 2009 doc.: IEEE 802.19-09/xxxxr0 Dec 2011 Conformance w/ TGai PAR & 5C Conformance Question Response Does the proposal degrade the security offered by Robust Security Network Association (RSNA) already defined in 802.11? No Does the proposal change the MAC SAP interface? Does the proposal require or introduce a change to the 802.1 architecture? Does the proposal introduce a change in the channel access mechanism? Does the proposal introduce a change in the PHY? Which of the following link set-up phases is addressed by the proposal? (1) AP Discovery (2) Network Discovery (3) Link (re-)establishment / exchange of security related messages (4) Higher layer aspects, e.g. IP address assignment 3 Huawei. Rich Kennedy, Research In Motion

RSNA Security Analysis Dec 2011 RSNA Security Analysis Stage 1:Network and Security Capability Discovery Stage 2: 802.11 Authentication and Association 802.11 Open System Authentication is included only for backward compatibility Stage 3: EAP/802.1X/RADIUS Authentication This stage execute the mutual authentication protocol based on EAP (i.e EAP-TLS, EAP-SIM/AKA/TTLS) authentication AP is functioning as authenticator to relay EAP messages This stage COULD be skipped in the scenarios of : 1) PMK cached for re-authentication 2) PSK is shared between STA and AP Stage 4: 4-way handshake: Both STA and the AP can trust each other with the authorized token (PMK) to derive the PTK and GTK Huawei

RSNA Security Analysis Dec 2011 RSNA Security Analysis Stage 5 (Optional): Group Key Handshake The AP will generate the fresh GTK and distributed this GTK to the STA GTK may be distributed during the Stage 4 Stage 6: Secure Data Communication DHCP request/response … Huawei

The Security Model of RSNA Dec 2011 The Security Model of RSNA AS STA Authenticate to derive MSK Policy Decision Point Policy Decision Point 2: Derive PMK from MSK AP Policy Enforcement Point Policy Enforcement Point 3: Use PMK to enforce 802.11 channel access Derive and use PTK Reference: “IEEE 802.11i Overview”, 2002, Nancy Cam-Winget, et al Huawei

RSNA Components IEEE 802.1X for Access Control Dec 2011 RSNA Components IEEE 802.1X for Access Control EAP (RFC 4017) for authentication and cipher suite negotiation 4-Way Handshake for establishing security association between STA and AP Pre-Shared Key (PSK) mode between AP and STA Huawei

RSNA Establishment Procedures (I) Dec 2011 RSNA Establishment Procedures (I) Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) Observation and potential Improvement Areas for FILS Area 1: (1) Beacon +AA RSN-IE Stage 1: Network and Security Capability Discovery (2) Probe Request (3) Probe Response + AA RSN-IE This Open authentication and association is nothing but an RSN negotiation between STA and AP, Could FILS authentication be in parallel here? At this stage, no MPDUs are allowed due to the 802.1X state machine blocking , Can we allow traffic to go through at this stage? (4) 802.11 Authentication Request Stage 2: 802.11 Authentication And Association (5) 802.11 Authentication Response (6) Association Request +SPA RSN IE (7) 802.11 Association Response Authenticated Associated 802.1x Blocked Security Params Authenticated Associated 802.1x Blocked Security Params (8) EAPOL-Start Stage 3: EAP/802.1X/ Radius Authentication (9) EAPOL-Request Identity (10) EAPOL-Response Identity Huawei

RSNA Establishment Procedures (II) Dec 2011 RSNA Establishment Procedures (II) Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) Area 2: (11) Radius Request 3) This EAP/802.1X/Radius is supplementing the Open system authentication with mutual authentication between STA and Radius, Can this authentication be skipped if FILS authentication CAN take place at stage 2. 4) Can this FILS authentication be faster in generating the PMK? Stage 3: EAP/802.1X/ Radius Authentication (12) Mutual Authentication (13) Radius Accept (14) EAPOL Success Master Session Key (MSK) Master Session Key (MSK) Pairwise Master Key (PMK) Pairwise Master Key (PMK) Pairwise Master Key (PMK) Area 3: (16) {AA, Anounce, sn, msg1} 5) 4-way handshake guarantees the STA can mutually trust the AP and share their keys with the indication of the PMK, Can this process be skipped or optimized to satisfy the FILS performance requirements? Pairwise Transient Key (PTK) Stage 4 4-Way Handshake (17) {SPA, Snounce, SPA, sn, msg2, MIC} PTK, GTK (18) {AA, Anounce, AA ,GTK, sn+1, msg3, MIC} (19) {SPA, sn+1, msg4, MIC} Huawei

RSNA Establishment Procedures (III) Dec 2011 RSNA Establishment Procedures (III) Supplicant Unauthenticated Unassociated 802.1x Blocked Authenticator Unauthenticated Unassociated 802.1x Blocked Authentication Server (Radius) GTK, 802.1X Unblocked 802.1X unblocked Generate Rand GTK DHCP Server Stage 5 Group Key Handshake (Optional) (20) EAPOL-Key {Group, sn+2,GTK, Key ID, MIC} (21) EAPOL-Key {Group, Key ID, MIC} New GTK Obtained Stage 6 Secure Data Communication (22 ) Protected Data Packets (23) DHCP Req/Res Huawei

Modified 802.11 Authentication and Association State Machine Dec 2011 Modified 802.11 Authentication and Association State Machine State 1 Unauthenticated, Unassociated Class 1 Frames FILS Deassociation Deauthentication Successful 802.11 Authentication Successful FILS Authentication State 2 Authenticated, Unassociated Class 1 & 2 Frames Successful (Re)Association –RSNA Required Deassociation State 5 Unsuccessful (Re)Association (Non-AP STA) cable-is-discovering-the-joys-of-wi-fi-why-not-mobile/ FILS Authenticated/Unassociated Class 1 & 2 Frames With Selected Management & Data Frames State 3 Authenticated, Associated (Pending RSN Authentication) Class 1 ,2 & 3 Frames IEEE 802.1X Controlled Port Blocked Successful 802.11 Authentication Deauthentication FILS Key Handshake 4- way Handshake Successful Unsuccessful (Re)Association (Non-AP STA) Deauthentication State 4 Disassociation Authenticated, Associated Class 1 ,2 & 3 Frames IEEE 802.1X Controlled Port UnBlocked Successful 802.11 Authentication Successful (Re) Association No RSNA required or Fast BSS Transitions Slide 11 Huawei

FILS Authenticated State Dec 2011 FILS Authenticated State Upon receipt of a Beacon message from a AP STA or Probe Request from non-AP STA with FILS authentication number, both the STA and AP’s shall transition to FILS Authenticated state STA at FILS Authenticated State , it allows Class 1,2 and selected Data frames piggybacked over Class 1 &2 frames to be transmitted Upon receipt of a De-association frame from either STA or AP STA with reasons, the STA at the FILS authenticated state will be transitioned to State 1. STA transitioned back to State 1 may retry with FILS authentication or use the RSNA authentication Upon receipt of a FILS key exchange success, the STA shall transition to state 4 which is allows full class 1, 2 and 3 frames to pass through. Selected Management Frames and Data Frames Reasons EAPOL To carry out the EAPOL authentication at FILS Authenticated State Huawei

Appropriate FILS Authentication Properties Dec 2011 Appropriate FILS Authentication Properties Mandatory Properties 802.11i FILS Security Mutual Authentication with key agreement Yes Strong Confidentiality RSNA Security Model Key Confirmation Key Derivation Fast Re-authentication Strong Session Key Replay Attack Protection/MTIM protection/Dictionary Attack /Impersonation Attack Protection Recommended Properties 802.11i FILS Security Fast and Efficient No Yes Forward Secrecy Implementation Related Denial of Service Resistance Huawei

Authentication Algorithm Number Field Dec 2011 Authentication Algorithm Number Field Insert the following FILS Authentication Algorithm Number Authentication algorithm number = 0: Open System Authentication algorithm number = 1: Shared Key Authentication algorithm number = 2: Fast BSS Transition Authentication algorithm number = 3: simultaneous authentication of equals (SAE) Authentication algorithm number = 4: FILS Authentication Authentication algorithm number = 65 535: Vendor specific use Huawei

Dec 2011 IEEE 802.11 TGai FILS Authentication (Revising 802.11Revmb Section 4.10.3.2) AP / Authenticator Supplicant AS 1) 802.11 Beacon 2) 802.11 Probe Request State 1 State 1 Removing EAP-Identity Request / Response Message 3) 802.11 Probe Response 4) |802.1x EAP OL-Start with Security Parameters for FILS handshake) (Snonce) 5) Access Request (EAP Request) State 5 6) EAP Authentication Protocol Exchange Supplicant Generates PMK AS Generates PMK State 5 7) Accept/ EAP Success/ PMK Authenticator Stores PMK, Generate Anounce and Derive PTK Key agreement Message is overhauled in 802.11 Auth Resp 8) 802.1x EAPOL success || msg 1: EAPOL-KEY (Anounce, Unicast, Encrypt (GTK, IGTK) ))||MIC Supplicant Derives PTK Huawei

Dec 2011 IEEE 802.11 TGai FILS Handshake (Revising 802.11Revmb Section 4.10.3.2) AP / Authenticator Supplicant Verify MIC State 5 9) 802.11 Association Request ( Msg 2: EAPOL-Key (Snounce, Unicastm ), MIC) Install PTK, GTK IGTK Verify MIC State 5 Install PTK, GTK IGTK 9) 802.11 Association Response (MIC) Secure Data Communication State 4 State 4 Huawei

Dec 2011 Protocol Analysis Parallelize the Open Authentication Request/Response with EAPOL Authentication for STA and AS to execute the mutual authentication with EAP method neutral and generate PMK Remove the EAP Identity Request and Response messages whose functions will be carried out in EAPOL start message Original 4 way handshake is reduced to 1-round key agreement to satisfy the performance requirements (changing from Bilateral Key confirmation to Unilateral key confirmation). Parallelize the message 1 of key agreement with EAP Success. Parallelize the message 2 of key agreement with 802.11 association request message. No violating RSNA security protocol and security models Total of 10 message handshakes vs 21 message handshakes Huawei

Dec 2011 Questions & Comments Huawei.