CAPWAP Overview Saag Presentation 65 th IETF 23 March 2006 Scott G. Kelly T. Charles Clancy

Slides:



Advertisements
Similar presentations
Secure Routing Panel FIND PI Meeting (June 27, 2007) Morley Mao, Jen Rexford, Xiaowei Yang.
Advertisements

RadSec – A better RADIUS protocol
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Adapted Multimedia Internet KEYing (AMIKEY): An extension of Multimedia Internet KEYing (MIKEY) Methods for Generic LLN Environments draft-alexander-roll-mikey-lln-key-mgmt-01.txt.
Authentication Applications. will consider authentication functions will consider authentication functions developed to support application-level authentication.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
Doc.: IEEE /250r2 Submission March 2004 Lily Yang, IETF CAPWAP Design Team EditorSlide WLAN Architectural Considerations for IETF CAPWAP.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
1 Wireless LAN Security Kim W. Tracy NEIU, University Computing
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Windows 2003 and 802.1x Secure Wireless Deployments.
Michal Rapco 05, 2005 Security issues in Wireless LANs.
Remedies Use of encrypted tunneling protocols (e.g. IPSec, Secure Shell) for secure data transmission over an insecure networktunneling protocolsIPSecSecure.
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
CAPWAP related draft-shao-opsawg-capwap-hybridmac-00 draft-chen-opsawg-capwap-extension-00 draft-zhang-opsawg-capwap-eap-00.
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Doc.: IEEE /751r0 Submission July 2004 Max Riegel, SiemensSlide 1 Selling network access Views from a business perspective Max Riegel Siemens.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 22 – Internet Authentication.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
1 DHCP Authentication Discussion INTAREA meeting, 70th IETF Vancouver, Canada Jari Arkko and Ralph Droms.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
ProjectIEEE Working Group on Mobile Broadband Wireless Access TitleIEEE MBWA Security Architecture.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
CAPWAP Overview SAAG Presentation 65 th IETF 23 March 2006 Scott G. Kelly T. Charles Clancy
Status of CAPWAP Architecture Draft Lily Yang Intel Corp. March 3, th IETF meeting.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
UNIVERSITY OF SOUTH CAROLINA Department of Computer Science and Engineering Secure Authentication System for Public WLAN Roaming Ana Sanz Merino, Yasuhiko.
Secure Active Network Prototypes Sandra Murphy TIS Labs at Network Associates March 16,1999.
PAWS: Security Considerations Yizhuang WU, Yang CUI PAWS WG
11 SECURING NETWORK COMMUNICATION Chapter 9. Chapter 9: SECURING NETWORK COMMUNICATION2 OVERVIEW  List the major threats to network communications. 
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
Cryptography and Network Security Chapter 14 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
CAPWAP Taxonomy Recommendations Pat R. Calhoun, Cisco Systems Bob O’Hara, Cisco Systems Inderpreet Singh, Chantry Networks.
Lecture 24 Wireless Network Security
CAPWAP Threat Analysis 66 th IETF, Montreal 10 July 2006 Scott KellyCharles Clancy.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Sec Title: Considerations on use of TLS for MIH protection Date Submitted: January 14, 2010.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
CAPWAP Arch-Draft Issues IETF 59, Seoul 4 March 2004.
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
Chapter 14 Network Encryption
CAPWAP Security 65 th IETF 20 March 2006 Scott Kelly
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /0690r0 Submission Andrew Myers, BT Slide 1 July GPP SA3 Interworking Security Issues II Andrew Myers British Telecommunications.
Requirements and Selection Process for RADIUS Crypto-Agility December 5, 2007 David B. Nelson IETF 70 Vancouver, BC.
CAPWAP Threat Analysis draft-kelly-capwap-threat-analysis th IETF, San Diego 6 November 2006 Scott KellyCharles Clancy.
December 14, 2000Securely Available Credentails (SACRED) - Framework Draft 1 Securely Available Credentials (SACRED) Protocol Framework, Draft Specification.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
Cryptography CSS 329 Lecture 13:SSL.
A Security Framework for ROLL draft-tsao-roll-security-framework-00.txt T. Tsao R. Alexander M. Dohler V. Daza A. Lozano.
CAPWAP Threat Analysis
Cryptography and Network Security
Discussions on FILS Authentication
Issue Discussion: KeyRSC (43)
3GPP WLAN Interworking Security Issues
WLAN Architectural Considerations for IETF CAPWAP
WLAN Architectural Considerations for IETF CAPWAP
Presentation transcript:

CAPWAP Overview Saag Presentation 65 th IETF 23 March 2006 Scott G. Kelly T. Charles Clancy

Agenda Introduction Some background and current scope Security-related protocols, relationships, considerations, requirements Current state of things Conclusion

Introduction Defining a protocol to control and provision wireless access points Things carried over protocol include –Access Point configuration/control –Network access control decisions –Cryptographic session keys Security is obviously a significant concern –Compromised communications may result in infrastructure take-over Working group wants to invite security area participation Requesting appointment of a security advisor –Formal liaison with security area –Avoid delays in document advancement due to security concerns –Provide security community connection for security reviews, advice

Background Early Architecture AP STA AS/AAA Mgmt WLAN ELEMENTS AS: Authentication Server, typically RADIUS AP: wireless access point STA: wireless station (typically a laptop)

Current Architecture ( Security Protocol Hierarchy and Interactions) WTP AC STA WTP AC STA AAA RADIUS IPsec CAPWAP 802.1X, i, WPA Mgmt SNMP HTTP TLS SSH 802.1X, i, WPA Each layer in hierarchy depends on layers above for security

Complex Trust Relationships WTP AC STA WTP AC STA AAA RADIUS PSK Long-Term EAP Credential PSK/Cert PTK WTP MSK/PMK MK Mgmt Admin Credential Color Coding short-term keys long-term keys

Why is security important in CAPWAP? Many interdependent security protocols between station and network CAPWAP must not degrade existing security (can’t become weak link) Multiple deployment models –Direct L2 connection Physical security solves most problems –Routed connection, one administrative domain Mobile network elements introduce infrastructure risks –Routed connection, potentially hostile hops Remote WTP scenarios –Employees take WTPs home –Branch office WTP, Central office AC –Hotspots –some hops may be over wireless Mesh (e.g. metro wifi)

Additional CAPWAP Security Considerations “Splitting the MAC” introduces security complexity If crypto is terminated at the WTP, security context must arrive there securely (via AC), and WTP must implement data security functions –Otherwise, AC implements data security functions Since user/station authentication is mediated by the AC, it must securely interact with AS –WTP forwards 802.1x frames to AC AC-WTP communications must not be a weak link; they require –Strong mutual authentication –Data integrity verification –Confidentiality (depends on deployment nuances, threats)

CAPWAP Protocol Security Requirements AC ↔ AAA STA ↔ AAA STA ↔ WTP Management ↔ AC NOT CURRENTLY IN SCOPE (but requirements nonetheless) IN SCOPE AC ↔ WTP –Authentication is unique, strong, mutual, and explicit –Communications protected by strong ciphersuite

Current State of CAPWAP 4 competing protocol proposals were evaluated –WG created independent eval team –Protocols: LWAPP,SLAPP,WiCoP,CTP WG chose LWAPP as basis for new CAPWAP protocol LWAPP provides its own proprietary security mechanisms Eval team (and others) recommended replacing this with DTLS

LWAPP Security Protocol, cont. T. Charles Clancy (UMD) conducted security review, proposed improvements Protocol subsequently modified to meet wg objectives draft requirements and Clancy suggestions LWAPP/DTLS draft submitted by Kelly & Rescorla DTLS added to capwap-00 draft as proposed security mechanism Numerous operational details yet to be specified, but no show-stoppers uncovered or anticipated WG still discussing, hopefully to reach closure soon

Compare/Contrast DTLS vs LWAPP Standards-based protocol TLS is well reviewed (DTLS is equivalent from security perspective) Widely deployed on the Internet (TLS) Negotiation capability provides for algorithm agility Several freely available implementations Built-in DoS protection Employs security best practices –Unidirectional crypto keys –Each side contributes to IVs –Security parameter verification via message hash Continued benefit from broad deployment and scrutiny Home-grown protocol Latest incarnation has only one public review Little deployment experience No algorithm negotiation – crypto change requires protocol forklift No known open source implementations No DoS protection A few questionable security practices –Same key used for transmit/receive –One side controls IV generation –No verification of negotiable parameters (psk vs cert) One-off (capwap-only) deployment severely limits exposure to scrutiny DTLSLWAPP

SUMMARY Security is clearly an integral concern for CAPWAP IEEE efforts primarily focused on STA+WTP+AS AC  WTP interactions introduce various subtleties It’s easy to get security wrong, even when clueful people are involved – more eyes on the problem mitigates the risk CAPWAP would clearly benefit from additional security community participation Group needs formal security advisor Formal liaison with security area –Avoid delays in document advancement due to security concerns –Provide security community connection for security reviews, advice Questions?

Background Early WLAN deployments rely on “fat” access points –Standalone, individually managed network elements –Limited range implies mgmt scaling issues –User roaming implies other infrastructure issues Current generation moving to centralized control model, “thin” access points This presents a number of challenges that merit IETF attention

Background, cont. Next Generation WLAN Architecture WTP AC STA AAA Mgmt WTP AC STA New Terms AC: Access Controller WTP: Wireless Termination Point CAPWAP Domain

Current CAPWAP Scope There are many security-related interactions among wlan elements –Management Plane AAA/AS AC WTP –Arguably, should be managed entirely by AC –AC-WTP communications –WTP-STA communications Much of the related security is out of scope (provided by various IEEE protocols, RADIUS/EAP extensions) Current CAPWAP scope covers only AC-WTP communications Obviously don’t want to introduce weak link

Preaching to the choir CAPWAP group has familiar question Homegrown vs standards-based security? This is a debate we’ve had before in IETF –Roll your own security protocol? –Or use a standard, well-scrutinized one instead? Getting to closure on this ASAP is a priority for capwap wg

LWAPP Security Overview Initial protocol was certificate-based –WTP generates random session ID, forwards this with cert to AC –AC validates cert, generates crypto keys, encrypts with WTP public key, signs encrypted keys + session ID, returns these to WTP (RSA key wrap) –WTP unwraps keys, uses AES-CCM for subsequent control channel communications This protocol had a number of shortcomings

CAPWAP Attack Containment WTP AC STA WTP AC STA AAA WTP Compromise Affected Nodes Unaffected Nodes