57 th IETF CAPWAP Security Issues David Molnar Security Architect July 18, 2003.

Slides:



Advertisements
Similar presentations
1 IETF KEYPROV WG Protocol Basis and Characteristics IEEE P April 11, 2007 Andrea Doherty.
Advertisements

Internet Protocol Security (IP Sec)
ECE454/CS594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall 2011.
Spring 2012: CS419 Computer Security Vinod Ganapathy SSL, etc.
1 Security Handshake Pitfalls. 2 Authentication Handshakes Secure communication almost always includes an initial authentication handshake: –Authenticate.
Lecture 6: Web security: SSL
TLS Introduction 14.2 TLS Record Protocol 14.3 TLS Handshake Protocol 14.4 Summary.
Socket Layer Security. In this Presentation: need for web security SSL/TLS transport layer security protocols HTTPS secure shell (SSH)
Working Connection Computer and Network Security - SSL, IPsec, Firewalls – (Chapter 17, 18, 19, and 23)
CMSC 414 Computer and Network Security Lecture 26 Jonathan Katz.
Chapter 5 Network Security Protocols in Practice Part I
Henric Johnson1 Ola Flygt Växjö University, Sweden IP Security.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
15-1 Last time Internet Application Security and Privacy Public-key encryption Integrity.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 IP Security Outline of the session –IP Security Overview –IP Security Architecture –Key Management Based on slides by Dr. Lawrie Brown of the Australian.
802.1x EAP Authentication Protocols
Protected Extensible Authentication Protocol
CMSC 414 Computer and Network Security Lecture 22 Jonathan Katz.
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Chapter 6 IP Security. Outline Internetworking and Internet Protocols (Appendix 6A) IP Security Overview IP Security Architecture Authentication Header.
CMSC 414 Computer (and Network) Security Lecture 24 Jonathan Katz.
Authentication System
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
Russ Housley IETF Chair Founder, Vigil Security, LLC 8 June 2009 NIST Key Management Workshop Key Management in Internet Security Protocols.
ECE453 – Introduction to Computer Networks Lecture 18 – Network Security (I)
Method of identifying mobile devices Srinivas Tenneti.
Light Weight Access Point Protocol (LWAPP) IETF 57 Pat Calhoun, Airespace.
Mobile and Wireless Communication Security By Jason Gratto.
Module 9: Planning Network Access. Overview Introducing Network Access Selecting Network Access Connection Methods Selecting a Remote Access Policy Strategy.
Wireless and Security CSCI 5857: Encoding and Encryption.
Secure Socket Layer (SSL)
8-1Network Security Chapter 8 roadmap 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity, authentication.
Remote Access Chapter 4. Learning Objectives Understand implications of IEEE 802.1x and how it is used Understand VPN technology and its uses for securing.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Eugene Chang EMU WG, IETF 70
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
1 Chapter 8 Copyright 2003 Prentice-Hall Cryptographic Systems: SSL/TLS, VPNs, and Kerberos.
1 Section 10.9 Internet Security Association and Key Management Protocol ISAKMP.
Lecture 11: Strong Passwords
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Network Security Essentials Chapter 5
23-1 Last time □ P2P □ Security ♦ Intro ♦ Principles of cryptography.
WEP Protocol Weaknesses and Vulnerabilities
Network Security David Lazăr.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Maryland Information Systems Security Lab D EPARTMENT OF C OMPUTER S CIENCE EAP Password Authenticated eXchange (PAX) T. Charles Clancy William A. Arbaugh.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
CAPWAP Threat Analysis 66 th IETF, Montreal 10 July 2006 Scott KellyCharles Clancy.
62 nd IETF – CAPWAP Working Group1 CAPWAP Objectives Saravanan Govindan March 2005.
Wireless and Mobile Security
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Chapter 14 Network Encryption
1 The Cryptographic Token Key Initialization Protocol (CT-KIP) KEYPROV WG IETF-68 Prague March 2007 Andrea Doherty.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wireless Network Security CSIS 5857: Encoding and Encryption.
1 (Re)Introducing Strong Password Protocols Radia Perlman
CAPWAP Threat Analysis draft-kelly-capwap-threat-analysis th IETF, San Diego 6 November 2006 Scott KellyCharles Clancy.
Lesson Introduction ●Authentication protocols ●Key exchange protocols ●Kerberos Security Protocols.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
Cryptography CSS 329 Lecture 13:SSL.
Chapter 5 Network Security Protocols in Practice Part I
Reviews Rocky K. C. Chang 20 April 2007.
IT443 – Network Security Administration Instructor: Bo Sheng
Presentation transcript:

57 th IETF CAPWAP Security Issues David Molnar Security Architect July 18, 2003

57 th IETF CAPWAP Security Issues David Molnar Security Architect July 18, 2003

3 What I’m Going To Talk About  Identify choices and goals for discussion  Make assumptions explicit  Scenarios for provisioning associations –Not last word  “Heavyweight” protocols on “lightweight” APs ?  Guiding principle: be paranoid –Weigh costs vs. benefits –Realize adversaries tend to do it if it can be done

4 What Are We Protecting?  Radio Control (RC) –Radio configuration, statistics, discovery  Session Management (SM) – management and 802.1x authentication frames  Data Tunneling (DT) –User data  Choice - What do we protect at which level? –Who protects DT? Access Point(AP) Access Router(AR) Wireless clients SM RC DT To network

5 Choice: MAC Termination  Terminate MAC at AR or AP? –Issues with QoS (802.11e), L2 fragmentation  Terminate at AP  Terminate at AR  Split Termination –Example: LWAPP drops encryption at AP, packetization at AR

6 Constraints  Wireless between Station and AP  AP-AR link may be L2, routed, or even wireless  MAC addresses spoofable  APs lightweight (more later)  Existing hardware crypto support in AP, AR  Must not break Attacks  “Rogue” APs and “Rogue” ARs  De-association and De-authentication of users  Eavesdropping on user data  Taking over AP or AR  Denial of Service

7 Secure Associations, not just Links  Alice, Bob, and Charlie all have certificates, can negotiate shared secret  BUT –How does Alice know she should be with Bob and not Charlie? (Rogue AR) –How does Bob know Alice should be with him? (Rogue AP)  Goal: Shared secret PLUS assurance of the “right” association.  Related issues: Discovery, Handoff Alice Bob Charlie

8 After Secure Association: Secure Transport  Now need to use shared secret  Some attacks possible on session: –Eavesdropping –Changing packets –Truncation –Reordering –Replay –Redirection –Reflection  Secure transport should prevent ALL such attacks  Choice: Adapt existing secure transport or build our own? –Extensive peer review critical for finding security flaws –Special requirements for AP-AR affect decision

9 Some Transport Pros&Cons  IPSec –Pros: widespread, scrutinized, works w/any IP transport –Cons: Heavyweight, NAT/firewall issues, assumes IP  TLS –Pros: widespread, scrutinized –Cons: Assumes certs, reliable transport  Can work around to use shared secret (Gutmann ID)  CMS (PKCS #7) –Pros: Indifferent to transport layer –Cons: No replay/reorder prevention, no session control  Custom –Pro: Can meet requirements exactly –Con: Time-consuming, error-prone

10 Scenario 1 : Shared Password  Simplest  Cryptographic issues –Should not use password directly as key –Use “key expansion,” e.g. PKCS #5 standard or IEEE1363 Key Derivation Function  Could use “zero-knowledge password protocols” –Prevent “offline guessing”; mitigate poor choice of user password –e.g. SRP (RFC 2945), SPEKE, EKE, PDM, many others –Patent issues are murky, see forthcoming IPR WG  Does not scale on its own (combine with RADIUS ?) “PASSWORD”

11 Scenario 2 : Imprinting  AP manually “imprints” on AR, exchanges shared secret  Associates only with imprinted AR (or delegate of AR)  AP keeps shared secret until imprint cleared –Can clearing be forced remotely?  Reference: “The Resurrecting Duckling” –  Issue – how exactly is imprinting done? –What if adversary imprints AP first?

12 Scenario 3: Management Layer meets PKI  Every AP and AR has certificate for unique name  Every AP and AR recognizes administrator’s public key  Administrator signs statement “AP Alice belongs with AR Bob” –List discussion – use x.509 alt name –Distributes to BOTH Alice and Bob  who’s the CA?  How is management layer configured for AR and AP?

13 Scenario 4: Guilty Until Proven Innocent  AP negotiates shared secret with AR, “preliminary association”  AR verifies association with management layer –No packets from AP to network until verification  Similar to EAP model  Association bound to shared secret –Maybe no certificate in AP at all  What information does management layer have for approval? – MAC address not credible – Device certs? Let AP on network? Yes/No

14 Wait, Aren’t APs Lightweight?  Public-key crypto expensive, slow  Symmetric-key crypto less expensive (and hardware support)  APs do not have physical random number generators –Good randomness critical  Conclusions –Use public-key rarely, establish long term symmetric key –Design protocols for no AP random number generation –OR design secure PRNG seed protocol for AP  Where does seed come from? –Factory-implanted seed –Shipped from AR (secured how? replays?) – informational document on seed generation

15 Future Directions  Clarify requirements  Evaluate transport layer requirements –Address AP RNG issue, L2/L3  Pick secure transport  Evaluate provisioning scenarios; develop new ones  Track relevant concurrent work –DNSSEC, Authenticated DHCP, enroll, TLS/UDP, etc… Suggestion  Solve secure transport, secure association separately –For transport, assume shared secret exists –Protocol extensions for methods to derive shared secret

16 Questions? Download presentation at