1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt

Slides:



Advertisements
Similar presentations
SSL/TLS Protocol Network Security Gene Itkis. Basic paradigmatic application: on-line purchase Client contacts Server (possibly for the first time) Spontaneity.
Advertisements

PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
1 Lecture 12 SSL/TLS (Secure Sockets Layer / Transport Layer Security) CIS CIS 5357 Network Security.
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
Unifying the conceptual levels of network security through use of patterns Ph.D Dissertation Proposal Candidate: Ajoy Kumar, Advisor: Dr Eduardo B. Fernandez.
17.1 Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display. Chapter 17 Security at the Transport Layer: SSL and TLS.
SSL: Secure Sockets Layer
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
Slide 1 Vitaly Shmatikov CS 378 SSL/TLS. slide 2 What is SSL / TLS? uTransport Layer Security protocol, version 1.0 De facto standard for Internet security.
1 SSL/TLS 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 A note on the use of these.
BASIC CRYPTOGRAPHY CONCEPT. Secure Socket Layer (SSL)  SSL was first used by Netscape.  To ensure security of data sent through HTTP, LDAP or POP3.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 “draft-urien-eap-smartcard-type-00.txt” EAP Smart Card Protocol (EAP-SC)
Mar 19, 2002Mårten Trolin1 This lecture On the assignment Certificates and key management SSL/TLS –Introduction –Phases –Commands.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
0 SSL3.0 / TLS1.0 Secure Communication over Insecure Line.
IEEE Wireless Local Area Networks (WLAN’s).
Chapter 8 Web Security.
Secure password-based cipher suite for TLS: The importance of end-to-end security Marie L.S. Dumont CS 265.
11 Secure Sockets Layer (SSL) Protocol (SSL) Protocol Saturday, University of Palestine Applied and Urban Engineering College Information Security.
Wireless and Security CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Eugene Chang EMU WG, IETF 70
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Cosc 4765 SSL/TLS and VPN. SSL and TLS We can apply this generally, but also from a prospective of web services. Multi-layered: –S-http (secure http),
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Proposed Transport Layer Security (TLS) Evidence Extensions Russ Housley IETF 67 – TLS WG Session.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Cryptography and Network Security (CS435) Part Fourteen (Web Security)
December 2008Prof. Reuven Aviv, SSL1 Web Security with SSL Network Security Prof. Reuven Aviv King Mongkut’s University of Technology Faculty of information.
Digital Envelopes, Secure Socket Layer and Digital Certificates By: Anthony and James.
8-1 Chapter 8 Security Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 part 3: Securing TCP.
TLS user mapping hint extension Stefan Santesson Microsoft.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
1 /10 Pascal URIEN, IETF 72 rd, Monday July 28 th Dublin, Ireland draft-urien-tls-keygen-00.txt TLS Key Generation
1 Pascal URIEN, IETF 63th Paris, France, 2nd August 2005 “draft-urien-eap-smartcard-type-02.txt” EAP Smart Card Protocol (EAP-SC)
Secure Sockets Layer (SSL) Protocol by Steven Giovenco.
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
1 SSL/TLS. 2 Web security Security requirements Secrecy to prevent eavesdroppers to learn sensitive information Entity authentication Message authentication.
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
Mar 28, 2003Mårten Trolin1 This lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
8-1 CSE 4707/5850 Network Security (2) SSL/TLS. 8-2 Think about Google or YouTube  Desired properties  Indeed the other side is Google or YouTube server.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Apr 1, 2003Mårten Trolin1 Previous lecture Certificates and key management Non-interactive protocols –PGP SSL/TLS –Introduction –Phases –Commands.
1 Pascal URIEN, IETF 61th, Washington DC, 10th November 2004 draft-urien-eap-smartcard-06.txt “EAP-Support in Smartcard”
TLS/SSL Protocol Presented by: Vivek Nelamangala Includes slides presented by Miao Zhang on April Course: CISC856 - TCP/IP and Upper Layer Protocols.
CSCE 715: Network Systems Security
GSS-API based Authentication and Key Establishment in TLS
Originally by Yu Yang and Lilly Wang Modified by T. A. Yang
CSE 4095 Transport Layer Security TLS
Chapter 7 WEB Security.
Security at the Transport Layer: SSL and TLS
CSCE 815 Network Security Lecture 16
SSL Protocol Figures used in the presentation
Chapter 7 WEB Security.
Presentation transcript:

1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt

2 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada Identity Exchange and Identity Protection in RFC 3748 Identity Exchange “Identity Requests and Responses are sent in cleartext, so an attacker may snoop on the identity, or even modify or spoof identity exchanges. To address these threats, it is preferable for an EAP method to include an identity exchange that supports per-packet authentication, integrity and replay protection, and confidentiality. The Identity Response may not be the appropriate identity for the method; it may have been truncated or obfuscated so as to provide privacy, or it may have been decorated for routing purposes” Identity Protection “An Identity exchange is optional within the EAP conversation. Therefore, it is possible to omit the Identity exchange entirely, or to use a method-specific identity exchange once a protected channel has been established.” “It is possible for the identity in the identity response to be different from the identity authenticated by the EAP method. This may be intentional in the case of identity privacy. An EAP method SHOULD use the authenticated identity when making access control decisions.”

3 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada EAP-METHODS as RFIDs: Identity Leakage The hacker aims at collecting the peer’s identity, over the air Passive attack, simple eavesdropping Active attack, EAP packets generation from a malicious Access Point. Number of EAP packets needed for active attacks EAP-SIM, RFC 4186, 2x requests, without previous knowledge EAP-AKA, RFC 4187, 2x requests, without previous knowledge EAP-TLS, RFC 2716, 3x requests. The knowledge of a valid authenticator’s certificate is required.

4 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada RFC 4186, EAP-SIM Identity Attack Peer (Malicious) Authenticator | | | EAP-Request/Identity | |< | | | | EAP-Response/Identity | | (Includes a pseudonym) | | >| | | | | | Server fails to map the | | | Pseudonym to a permanent id. | | | EAP-Request/SIM/Start | | (AT_PERMANENT_ID_REQ, AT_VERSION_LIST) | |< | | | | EAP-Response/SIM/Start | | (AT_IDENTITY with permanent identity, AT_NONCE_MT, | | AT_SELECTED_VERSION) | | >| | | 1 2 PEER’S FULL IDENTITY

5 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada EAP-AKA, RFC 4187, Identity Attack Peer (malicious) Authenticator | EAP-Request/Identity | |< | | EAP-Response/Identity | | (Includes a pseudonym) | | >| | | | Server fails to decode the | | | Pseudonym. | | | EAP-Request/AKA-Identity | | (AT_PERMANENT_ID_REQ) | |< | | | | EAP-Response/AKA-Identity | | (AT_IDENTITY with permanent identity) | | >| | | 1 2 PEER’S FULL IDENTITY

6 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada EAP-TLS, RFC 2716, Identity Attack Authenticating Peer (Malicious) Authenticator =================== ========================= <- PPP EAP-Request/Identity PPP EAP-Response/ Identity (MyID) -> <- PPP EAP-Request/ EAP-Type=EAP-TLS (TLS Start) PPP EAP-Response/ EAP-Type=EAP-TLS (TLS client_hello)-> <- PPP EAP-Request/ EAP-Type=EAP-TLS (TLS server_hello, TLS certificate, [TLS server_key_exchange,] [TLS certificate_request,] TLS server_hello_done) PPP EAP-Response/ EAP-Type=EAP-TLS (TLS certificate, TLS client_key_exchange, [TLS certificate_verify,] TLS change_cipher_spec, TLS finished) -> PEER’S FULL IDENTITY

7 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada Classical solutions, but not standardized Establishment of a first protected channel, that secures the peer’s identity Asymmetric protected channel Protected EAP Protocol (PEAP) Version 2, daft-josefsson- pppext-eap-tls-eap-10.txt (2004, expired) EAP Tunneled TLS Authentication Protocol Version (EAP- TTLSv1), draft-funk-eap-ttls-v1-01.txt, (2006, Active) Symmetric protected channel EAP-Double-TLS Authentication Protocol, draft-badra-eap- double-tls-05.txt (2006, active)

8 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada Proposed solution for EAP-TLS Main idea The peer’s certificate is sent encrypted, the encryption key is deduced from the master_secret. encryption_key = PRF(master_secret, "client_certificate",client_random+server_random); In order to allow an EAP-TLS peer to request identity protection exchange, a new extension type is added (TBD) to the Extended Client and Server Hello messages. The 'extension_data' field of this extension contains a list of encryption algorithms supported by the client, ordered by preference. If the server is willing to accept using the extension, the client and the server negotiate the symmetric algorithm that will be used to encrypt/decrypt the client certificate. At the end of the hello phase, the client generates the pre_master_secret, encrypts it under the server's public key, and sends the result to the server. Encryption of the peer’s certificate If a stream cipher is chosen, then the peer's certificate is encrypted with the enc_key, without any padding byte. If a block cipher is selected, then padding bytes are added to force the length of the certificate message to be an integral multiple of the bloc cipher's length.

9 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada Identity Protection Dialog PreMasterSecret MasterSecret Encryption Key

10 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada Pros and Cons Pros Simple and Elegant solution Very easy to implement Highly trusted, when implemented in an EAP smartcard (draft- urien-eap-smartcard-10.txt) Cons Backward compatibility ? Open issues Is it possible to negotiate privacy (and how) ? "Privacy is the right to informational self-determination, i.e., individuals must be able to determine for themselves when, how, to what extent and for what purpose information about them is communicated to others“. S Kent and L Millet, "Who goes there? Authentication through the lens of privacy", The National Academies Press, Washington, D.C., Questions, comments, advices ? “EAP Support in Smartcard”