EAP Scenarios and 802.1af Joseph Salowey 1/12/2006.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

1 Multi Kingdom AAA Security using Kerberos v5 Kaushik Narayan.
Kerberos Authentication. Kerberos Requires shared secret with KDC ( perhaps not for PKINIT) Shared session key established Time synchronization needed.
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: The Role of a Media Independent Authenticator Date Submitted: December 30, 2009.
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec Title: IEEE r Fast BSS Transition – A Study Date Submitted: September 21, 2009 Present.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Security Group TR Date Submitted: 20 th January, 2009 Presented at IEEE
802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
1 Needham-Schroeder Key Descriptor 11/12/2002 Needham-Schroeder Key Descriptor Robert G. Moskowitz ICSAlabs IEEE 802 Plenary Meeting Kauai, Nov 12, 2002.
EPON Technology Team 2/9/2014 Key Management [802.1af - Issues] Jee-Sook Eun Electronics and Telecommunications Research Institute.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Possible MIH security approaches and issues Date Submitted: September.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
EAP Channel Bindings TF-MNM Lyon, February 16, 2011 Alan DeKok FreeRADIUS.
Supervisor :Dr. Lo'ai Ali Tawalbeh Done by: Wa’el Musa Hadi
Levels of Assurance: An Overview Peter Alterman, Ph.D. Chair, Federal PKI Policy Authority.
WLAN IW Enhancement for Multiple Authentications Support Notice: Contributors grant free, irrevocable license to 3GPP2 and its Organization Partners to.
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
EAP AKA Jari Arkko, Ericsson Henry Haverinen, Nokia.
CIS 725 Key Exchange Protocols. Alice ( PB Bob (M, PR Alice (hash(M))) PB Alice Confidentiality, Integrity and Authenication PR Bob M, hash(M) M, PR Alice.
Jesse Walker, keying requirements1 Suggested Keying Requirements Jesse Walker Intel Corporation
Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
Session Policy Framework using EAP draft-mccann-session-policy-framework-using-eap-00.doc IETF 76 – Hiroshima Stephen McCann, Mike Montemurro.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
EAP Mutual Cryptographic Binding draft-ietf-karp-ops-model-03 draft-ietf-karp-ops-model-03 S. Hartman M. Wasserman D. Zhang.
xxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxx Title: Proposal for adding a key hierarchy based approach in the security.
Eugene Chang EMU WG, IETF 70
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
IS511 Introduction to Information Security Lecture 4 Cryptography 2
1 Course Number Presentation_ID © 2001, Cisco Systems, Inc. All rights reserved. External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt.
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
All Rights Reserved © Alcatel-Lucent 2007, ##### 1 | Presentation Title | January 2007 UMB Security Evolution Proposal Abstract: This contribution proposes.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
November 2005IETF 64, Vancouver, Canada1 EAP-POTP The Protected One-Time Password EAP Method Magnus Nystrom, David Mitton RSA Security, Inc.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
7/13/061 Handover Keying Reqs IETF 66 Montreal. 7/13/062 Problem scope requirements (1) MUST Support multiple access technologies MUST not require full.
IEEE MEDIA INDEPENDENT HANDOVER Title: Use Cases, Security Study Group Date Submitted: Nov 13 th, 2007 Presented at: IEEE Security SG Authors.
ERP/AAK support for Inter-AAA realm handover discussion Hao Wang, Tina Tsou, Richard.
Doc: IEEE xxx Submission March 2015 Jeongseok Yu et al., Chung-Ang University Project: IEEE P Working Group for Wireless Personal.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Key Management in AAA Russ Housley Incoming Security Area Director.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
1 EAP-MAKE2: EAP method for Mutual Authentication and Key Establishment, v2 EMU BoF Michaela Vanderveen IETF 64 November 2005.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
RADIUS Attributes for the Delivery of Keying Material Joe Salowey Jesse Walker Tiebing Zhang Glen Zorn.
IETF-84 EMU TEAP Updates Nancy Joseph Salowey Hao Zhou
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: xxxx Title: MIH security issues Date Submitted: July, 02, 2007 Presented at.
WLAN IW Enhancement for Multiple Authentications Support QUALCOMM Inc.: Raymond Hsu, QUALCOMM Inc.: Masa Shirota,
Non Web-based Identity Federations - Moonshot Daniel Kouril, Michal Prochazka, Marcel Poul ISGC 2015.
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
for IP Mobility Protocols
ERP extension for EAP Early-authentication Protocol (EEP)
IETF-70 EAP Method Update (EMU)
ERP/AAK support for Inter-AAA realm handover discussion
IEEE MEDIA INDEPENDENT HANDOVER
SAML assisted Diffie-Hellman MIKEY
Securing the CASP Protocol
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
IEEE MEDIA INDEPENDENT HANDOVER
Presentation transcript:

EAP Scenarios and 802.1af Joseph Salowey 1/12/2006

Basic EAP Model EAP Peer EAP Authen- ticator EAP Server Authentication Keys

AAA Model EAP Peer EAP Authen- ticator AAA Server Authentication Keys (Authorization) EAP Server

AAA Model Notes Peer authenticates AAA server AAA server provides authenticator with key Possession indicates to peer that authenticator is authorized Peer does not know the identity of the authenticator, by default it cant differentiate between authenticators Authenticator receives authorizations from AAA server

3 rd Party Authentication Model EAP Peer EAP Authen- ticator Authentication Services Authentication EAP Server (Online or Offline)

3 rd Party Authentication Model Notes Peer authenticates the authenticator Peer knows the authenticators identity Peer must be able to authorize based on identity information Authenticator does not get authorization based on authentication exchange Authentication service may be offline as in PKI CA Authentication service may be online as in Kerberos

Approaches to modifying the AAA model (channel bindings) Bind authenticator/service identity into EAP exchange –EAP methods do not interpret the data, instead transport data –Draft-arkko-eap-service-identity-auth-04 Specify target authenticator/service –Mechanism dependent implementation (kerberos, channel binding, credential selection) Bind authenticator/service identity to key material –Draft-obha-aaa-key-binding-01

3 rd Party authentication case SW1SW2 Authentication Services (offline) Authentication Mutual

Unilateral AAA case SW1SW2 Mutual Authentication AAA

Bilateral AAA case SW1SW2 Mutual Authentication x 2 AAA AZ

EAP and keys EAP methods can derive key material –MSK available to the authenticator –EMSK reserved (for derivation of other keys TBD) MSK may be used to derive session keys data encryption (802.11i) MSK may be used to derive KEK to encrypt key descriptor to distribute keys (group keys) Either or both approaches may be useful for CAK establishment