EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Washinton D.C., November 2004 IETF 61 st – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena.
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
ARP Cache Poisoning How the outdated Address Resolution Protocol can be easily abused to carry out a Man In The Middle attack across an entire network.
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
1Nokia Siemens Networks Presentation / Author / Date University of Twente On the Security of the Mobile IP Protocol Family Ulrike Meyer and Hannes Tschofenig.
AAA Mobile IPv6 Application Framework draft-yegin-mip6-aaa-fwk-00.txt Alper Yegin IETF 61 – 12 Nov 2004.
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 67 - ANCP WG November 5-10, 2006 draft-moustafa-ancp-security-threats-00.txt.
D1 - 29/06/2015 The present document contains information that remains the property of France Telecom. The recipient’s acceptance of this document implies.
Chapter 16 AAA. AAA Components  AAA server –Authenticates users accessing a device or network –Authorizes user to perform specific activities –Performs.
Carrying Location Objects in RADIUS Hannes Tschofenig, Farid Adrangi, Avi Lior, Mark Jones.
Chapter 18 RADIUS. RADIUS  Remote Authentication Dial-In User Service  Protocol used for communication between NAS and AAA server  Supports authentication,
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
November st IETF MIP6 WG Mobile IPv6 Bootstrapping Architecture using DHCP draft-ohba-mip6-boot-arch-dhcp-00 Yoshihiro Ohba, Rafael Marin Lopez,
Doc: Submission September 2003 Dorothy Stanley (Agere Systems) IETF Liaison Report September 2003 Dorothy Stanley – Agere Systems IEEE.
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: Problem Statement for Authentication Signaling Optimization Date.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
Submission November 2003 Dorothy Stanley (Agere Systems) IETF Liaison Report November 2003 Dorothy Stanley – Agere Systems IEEE Liaison To/From.
3Com Confidential Proprietary 3G CDMA AAA Function Yingchun Xu 3COM.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
March 15, 2005 IETF #62 Minneapolis1 EAP Discovery draft-adrangi-eap-network-discovery-10.txt Farid Adrangi ( )
July 16, 2003AAA WG, IETF 571 EAP Keying Framework Draft-aboba-pppext-key-problem-07.txt EAP WG IETF 57 Vienna,
EAP Extensions for EAP Early Authentication Protocol (EEP) Hao Wang, Yang Shi, Tina Tsou.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Detailed analysis on MIA/MSA architecture Date Submitted: January 5, 2010 Present.
Doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 1 Network Selection Bernard Aboba Microsoft
August 2, 2005draft-vidya-mipshop-fast-handover-aaa-00 Handover Keys using AAA (draft-vidya-mipshop-fast-handover-aaa-00.txt) Vidya Narayanan Narayanan.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: Message Flow Date Submitted: March 1, 2011 Authors or Source(s): Fernando Bernal-Hidalgo,
Draft-ietf-aaa-diameter-mip-15.txt Tom Hiller et al Presented by Pete McCann.
2006/7/10IETF66 RADEXT WG1 Pre-authentication AAA Requirements Yoshihiro Ohba Alper Yegin
Security Threats and Security Requirements for the Access Node Control Protocol (ANCP) IETF 68 - ANCP WG March 18-23, 2007 draft-ietf-ancp-security-threats-00.txt.
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
1 Network Selection Problem Definition Draft-ietf-eap-netsel-problem-01.txt Jari Arkko Bernard Aboba.
Design Guidelines Thursday July 26, 2007 Bernard Aboba IETF 69 Chicago, IL.
Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.
RFC 2716bis Wednesday, July 12, 2006 Draft-simon-emu-rfc2716bis-02.txt Dan Simon Bernard Aboba IETF 66, Montreal, Canada.
San Diego, August 2004 IETF 60 th – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-01) Gerardo Giaretta.
Minneapolis, March 2005 IETF 62 nd – mip6 WG Goals for AAA-HA interface (draft-giaretta-mip6-aaa-ha-goals-00) Gerardo Giaretta Ivano Guardini Elena Demaria.
Extended QoS Authorization for the QoS NSLP Hannes Tschofenig, Joachim Kross.
IEEE MEDIA INDEPENDENT HANDOVER Title: An Architecture for Security Optimization During Handovers Date Submitted: September,
IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: IETF Pre-authentication Activity Date Submitted: February 26, 2006.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
1 Extensible Authentication Protocol (EAP) Working Group IETF-57.
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
1 IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: EAP Pre-authentication Problem Statement in IETF HOKEY WG Date Submitted: September,
WREC Working Group IETF 49, San Diego Co-Chairs: Mark Nottingham Ian Cooper WREC Working Group.
San Diego, November 2006 IETF 67 th – mip6 WG Goals for AAA-HA interface (draft-ietf-mip6-aaa-ha-goals-03) Gerardo Giaretta Ivano Guardini Elena Demaria.
RADIUS By: Nicole Cappella. Overview  Central Authentication Services  Definition of RADIUS  “AAA Transaction”  Roaming  Security Issues and How.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN.
August 4, 2004EAP WG, IETF 601 Authenticated service identities for EAP (draft-arkko-eap-service-identity-auth-00) Jari Arkko Pasi Eronen.
Port Based Network Access Control
11/20/2002IETF 55 - AAA WG, NASREQ-101 Diameter-Nasreq-10 Dave Mitton, Most recent Document Editor With Contributions from David Spence & Glen Zorn.
IEEE MEDIA INDEPENDENT HANDOVER DCN:
Informing AAA about what lower layer protocol is carrying EAP
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
Phil Hunt, Hannes Tschofenig
Katrin Hoeper Channel Bindings Katrin Hoeper
Jari Arkko Bernard Aboba
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
MAC Address Hijacking Problem
PEKM (Post-EAP Key Management Protocol)
AP Functional Needs of CAPWAP
Network Selection Bernard Aboba Microsoft
TGr Authentication Framework
Presentation transcript:

EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft

Document Status Just recently accepted as WG work item Normative statements relating to EAP copied to RFC 2284bis –Result: EAP methods no longer dependent on Key Framework document Substantial revisions in progress –Issue 180: Conversation overview section rewritten (-02) –Rewrites of other sections (e.g. SAs) likely in -02 –Threat model needed Challenges –What threats do we choose to address, which ones will we not address? –Separation of media-specific behavior from general principles

Currently Open Issues Issue 15: Key Distribution Insecure Issue 179: EAP PRF Issue 187: Service SAs

Security Issues Key Scoping “Correctness” in Fast Handoff & Context Transfer The lying NAS problem

Key Scoping AAA context is associated with a key Default scope for a AAA-Key is within a NAS –AAA protocols authenticate at NAS granularity Diameter, RADIUS don’t use the NAS Called- Station-Id as its identity Key is scoped to the physical NAS; can’t assume separate key cache for each “virtual NAS”, Called- station-Id, SSID, etc. –Client may not be able to recognize NAS scope without assistance from the lower layer In IEEE only the BSSID is announced in the Beacon/Probe Response, not the NAS-Identifier

“Correctness” in Fast Handoff & Context Transfer Definition of “Correct”: when the same state results as if the peer had authenticated with the AAA server Examples of “incorrect” transactions: –Peer authenticates with GUEST SSID derives a key, does successful fast handoff within same physical AP to the CARRIER SSID Result: Carrier sees an accounting record for GUEST which either doesn’t have an account, or it bills the wrong user –Peer authenticates to an AP, does fast handoff to same virtual AP in order to cause Session-Time variable to be reset. Clients gains unlimited network access. Solution –Need AAA attributes to allow key scope restriction Authorized SSIDs Authorized Called, Calling-Station-Ids “No Fast Handoff” or “No context transfer” attributes

The Lying NAS Problem NAS can provide different information to the peer and the Authentication Server –Fraud To peer: “I offer access to the Joe’s Hotspot” To AS: “I offer access to the CARRIER network” Fooling user into associating to a “free” network then charging for it –Spoofing To peer: “I’m AP57” To AS: “I’m AP59” Motivation: DoS on neighbor graph calculations

Solutions AAA agent checks –AAA agent (proxy, redirect, etc.) can see if NAS attributes match expected ones –Doesn’t prevent NAS from lying to the peer, only from lying to the AAA Logging –Peer and AS can log information sent by the NAS, if a dispute arises, can verify later –Useful only for forensics Key mixing –Peer and AS include attributes when calculating the AAA-Key –If NAS provides different info to Peer and AS, then Peer and NAS won’t be able to communicate –Only viable if relevant attributes are few and well defined, not easily extensible Method-specific binding –EAP method includes exchange of attributes between the peer and EAP server –Peer and EAP server compare the exchanged values with ones sent by the NAS –Examples: EAP Archie, PEAPv2

Questions?