Doc.: 11-13-0201-07 Submission May 13, 2013 Rene Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects, FILS Piggy-Backing Date: 2013-05-13.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
Advertisements

IPv4 - The Internet Protocol Version 4
MAC Header Compression
SSL CS772 Fall Secure Socket layer Design Goals: SSLv2) SSL should work well with the main web protocols such as HTTP. Confidentiality is the top.
CCNA – Network Fundamentals
ECE 454/CS 594 Computer and Network Security Dr. Jinyuan (Stella) Sun Dept. of Electrical Engineering and Computer Science University of Tennessee Fall.
IP Security IPSec 2 * Essential Network Security Book Slides. IT352 | Network Security |Najwa AlGhamdi 1.
MOBILITY SUPPORT IN IPv6
Gursharan Singh Tatla Transport Layer 16-May
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
1 The Internet and Networked Multimedia. 2 Layering  Internet protocols are designed to work in layers, with each layer building on the facilities provided.
TCP1 Transmission Control Protocol (TCP). TCP2 Outline Transmission Control Protocol.
Doc.: IEEE /1054r0 Submission Sep Santosh Pandey (Cisco)Slide 1 FILS Reduced Neighbor Report Date: Authors:
(Business) Process Centric Exchanges
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Karlstad University IP security Ge Zhang
IPsec Introduction 18.2 Security associations 18.3 Internet Security Association and Key Management Protocol (ISAKMP) 18.4 Internet Key Exchange.
Review for Exam 4 School of Business Eastern Illinois University © Abdou Illia, Fall 2004.
Doc.: r1 Submission October 30, 2012 René Struik (Struik Security Consultancy)Slide 1 Discussion of Outstanding TGai Security Topics Date:
Doc.: IEEE /0977r2 Submission NameAffiliationsAddressPhone Hitoshi MORIOKA ROOT INC Tenjin, Chuo-ku, Fukuoka JAPAN
Doc.: IEEE /0880r2 Submission Scheduled Trigger frames July 2015 Slide 1 Date: Authors: A. Asterjadhi, H. Choi, et. al.
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
IP security Ge Zhang Packet-switched network is not Secure! The protocols were designed in the late 70s to early 80s –Very small network.
Doc.: IEEE /1378r0 Submission November 2008 Darwin Engwer, Nortel NetworksSlide 1 Improving Multicast Reliability Date: Authors:
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Doc.: IEEE /0133r3 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0568r0 Submission May 2012 Young Hoon Kwon, Huawei Slide 1 AP Discovery Information Broadcasting Date: Authors: NameAffiliationsAddressPhone .
Doc.: Submission January 22, 2014 Rene Struik (Struik Security Consultancy)Slide 1 TGai Motions Date: Authors: NameCompanyAddressPhone .
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
IPSec is a suite of protocols defined by the Internet Engineering Task Force (IETF) to provide security services at the network layer. standard protocol.
Doc.: Submission March 21, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects Date: Authors:
Doc.: IEEE /0263r1 SubmissionJae Seung Lee, ETRI Spec Framework Proposal: Selection of the AP for Scanning Date: Slide 1 March 2012.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: Submission April 22, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects, FILS Piggy-Backing Date:
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Submission doc.: IEEE 11-13/0324r0 March 2013 M. Emmelmann, FOKUSSlide 1 TGai Principles and Mechanisms (Joint TGai and TGaq Meeting) Date:
K. Salah1 Security Protocols in the Internet IPSec.
Doc.: Submission February 5, 2013 René Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects Date: Authors:
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
8-1Network Security Virtual Private Networks (VPNs) motivation:  institutions often want private networks for security.  costly: separate routers, links,
Submission doc.: IEEE 11-15/1060r0 September 2015 Eric Wong (Apple)Slide 1 Receive Operating Mode Indication for Power Save Date: Authors:
Lecture 10 Page 1 CS 236 Online Encryption and Network Security Cryptography is widely used to protect networks Relies on encryption algorithms and protocols.
Doc.: Submission May 14, 2013 Rene Struik (Struik Security Consultancy)Slide 1 FILS Piggy-Backing Aspects Date: Authors: NameCompanyAddressPhone .
Chapter 9: Transport Layer
FILS Reduced Neighbor Report
Instructor Materials Chapter 9: Transport Layer
Authentication and Upper-Layer Messaging
IP - The Internet Protocol
Encryption and Network Security
IT443 – Network Security Administration Instructor: Bo Sheng
Service discovery architecture for TGaq
AP Discovery Information Broadcasting
FILS Handling of Large Objects
FILS Handling of Large Objects, FILS Piggy-Backing
FILS Handling of Large Objects
FILS Reduced Neighbor Report
FILS Handling of Large Objects
TGai Motions Date: Authors: January 22, 2014 Name Company
AP Status Broadcast Date: Authors: November 2011
FILS Handling of Large Objects
FTM Frame Exchange Authentication
FILS Frame Content Date: Authors: February 2008
Month Year doc.: IEEE yy/xxxxr0 May 2012
Reducing Overhead in Active Scanning
Reducing Overhead in Active Scanning
Presentation transcript:

doc.: Submission May 13, 2013 Rene Struik (Struik Security Consultancy)Slide 1 FILS Handling of Large Objects, FILS Piggy-Backing Date: (WORKING DRAFT ONLY!!!) Authors: NameCompanyAddressPhone René StruikStruik Security Consultancy Toronto ON, CanadaUSA: +1 (415) Toronto: +1 (647) Skype: rstruik

doc.: Submission FILS Key Establishment May 13, 2013 STA AP Association Request Beacon/Probe Resp. Authentication Request Authentication Response Association Request Key Establishment Key Confirmation TTP online/offline assistance with authentication FILS key establishment protocol options provided:  FILS Authentication with TTP, based on ERP (two flavors: with or without “PFS” (ERP+ECDH, resp. ERP)  see next slides)  Authentication without online TTP, based on ECDH and ECDSA certificate Slide source: 13/324r0 Slide 2Rene Struik (Struik Security Consultancy)

doc.: Submission Adding “piggy-backed info” to protocol flows … May 13, 2013 STA AP Association Request Beacon/Probe Resp. Authentication Request Authentication Response Association Request Key Establishment Key Confirmation TTP Services + piggy-backed info response + piggy-backed info request Authentication help Configuration help IP address assignment Authorization Subscription credentials Piggy-backing info along FILS authentication protocol:  Higher-layer set-up, including IP address assignment  Authorization functionality, subscription credentials, etc. See details elsewhere in presentation Slide source: 13/324r0 Slide 3Rene Struik (Struik Security Consultancy)

doc.: Submission FILS Security Status May 13, 2013 Current Status:  Three FILS authentication protocol options specified:  FILS Authentication with Trusted Third Party  FILS Authentication with Trusted Third Party and “PFS”  FILS Authentication without Trusted Third Party  Main differences:  Different trust assumptions  Different assumption on “pre-existing” system set-up  Different assumptions on online availability of the “backbone network”  Common elements:  All have only four protocol flows  All implemented via Authentication/Association Request/Response frames  All allow piggy-backing of other info along Association frames (e.g., IP address assignment) Current Work in Progress:  How to deal with large objects (e.g., certificates, higher-layer data objects)  How to specify main piggy-backing details (e.g., on IP address assignment) Slide source: 13/324r0 Slide 4Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Questions 1. How to deal with large objects (e.g., certificates, higher-layer data objects)?  Intra-frame fragmentation. How to handle large objects that fit within a single frame  Inter-frame fragmentation. How to fragment FILS frames, if these become too long due to large objects 2. How to specify main piggy-backing details (e.g., on IP address assignment)?  Flexibility re AEAD authenticated encryption mode. Authentication and potential encryption of piggy-backed information Slide 5Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Frame Fragmentation ( ) Conceptual Channel Channel w/Fragmentation Notes:  Header contains Sequence Control Field that indicates fragment# (4-bits) and sequence # (12-bits)  Originator (A) partitions frame body and sends individual segments in separate frames, in order  Recipient (B) reconstructs original (conceptual) frame from received segments, in order  When secure channel used, each segment is individually secured (by originator) or unsecured (by recipient)  Duplicate segments and segments received after time-out are acknowledged allows fragmentation/defragmentation with individually addressed MSDUs and MMPDUs HDR BodyFCS AB HDR 1 Body 1 FCS 1 AB Body 3 FCS 3 Body 2 FCS 2 A A B B HDR 2 HDR 3 Slide 6Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Use of Existing Frame Fragmentation with FILS Indeed possible, FILS protocol does not use frame protection Doesn’t this cause Denial-of-Service Attacks? With TTP:  AP needs to keep state on Auth Request received from STA till moment it receives verdict back from TTP;  AP may need to keep state longer, till it received and processed Assoc Request from STA (prior to key confirmation, there is no evidence that STA was indeed alive) Without TTP:  AP may need to keep state till it received and processed Assoc Request from STA (prior to key confirmation, there is no evidence that STA was indeed alive) Conclusion:  With either FILS scheme, AP needs to keep state till it received and processed message flow #3 (Assoc Request aka key confirmation) from STA.  Without TTP, time window during which AP needs to keep state may be shorter than if back-end TTP communication required, depending on implementation details. Slide 7Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Doesn’t this cause Denial-of-Service Attacks? (cont’d #1) Effect of fragmentation  FILS initiated by single STA sending fragmented Auth Request with 3 fragments: AP: keep 1 record; correspond with up to 1 TTP; perform 1 computation  FILS initiated by 3 STAs sending short, non-fragmented Auth Request only: AP: keep 3 records; correspond with up to 3 TTPs; perform 3 computations Conclusion: In terms of resource consumption, Denial-of-Service attack scales at most linearly with number of STAs or with maximum # of fragments in Auth frame. Slide 8Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Doesn’t this cause Denial-of-Service Attacks? (cont’d, #2) Effect of authorization AP may need to maintain state longer, if ultimate verdict on access based on both  Authentication of STA;  Authorization of STA. Time window to reach authorization decision determines DoS attack time window. Hence, beneficial to  get early-on insight into credential validity (e.g., certificate verification so as to know who STA is)  communicate certificates early-on (in Auth Req/Resp) helps  get early-on insight into authorization decisions (e.g., by third party)  “aggressive mode” piggy-backing (w/ some stuff in Auth Req/Resp.) helps as well Conclusion: In real life, there are limits to time-bounded local resource allocation to handle n STA join request. Having modest (say, at most three) # fragments does not impact this a lot. Slide 9Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Frame Fragmentation – Straw Poll #1 Use existing frame fragmentation mechanism ( ) to handle frames that would otherwise not “fit”.  Yes  No  “Don’t Care”  Need more information Result: Slide 10Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Intra-Frame Fragmentation with FILS (1) Conceptual Object Representation as Sequence of Information Elements Conversion mechanism:  Represent single object/multiple objects within single frame  Allows recovering of original object from representation  Works also if object spread over multiple frames  Allows reconstruction as soon as segments all received Note: This allows full flexibility on how one could carry objects within a single and across multiple frames Body 255Body 1 Body 3 Body IE 1 IE 2 IE Foreign object:  may live outside  syntax/semantics unknown  to e.g., DHCP, Higher Layer, IP Large object:  may not fit within single IE e.g., Certificate chain Represent as ordered sequence of IEs  “piggy-backing” possible  “squeezing” large objects into frame possible  “spreading” large objects over several frames too… Requires one new IE Slide 11Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Intra-Frame Fragmentation with FILS (2) Conceptual Object Representation as Sequence of Information Elements How to recover objects?  Within single frame: separator symbol (‘  ’) allows unique recovery of multiple objects  Object spread over multiple frames: parse till ‘  ’-symbol found (assuming only one object to spread across) Note:  Up to implementation to partition to one’s needs  Representation with multiple ‘  ’-symbols in the end possible (“padding”) Body 255Body 1 Body 3 Body IE 1 IE 2 IE IE 4 end-of-object indicator (‘  ’,  EOF, etc.) object “segments” (in order) Slide 12Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Intra-Frame Fragmentation with FILS (3) Applications:  Foreign object:  may live outside  syntax/semantics unknown to e.g., DHCP, Higher Layer, IP (cf. D0.5, Section )  Large object:  may not fit within single IE e.g., Certificate, certificate chain (“super-sized” public key IE, D0.5, ) Construct allows more than one foreign object/large object in single frame Lots of flexibility in reducing likelihood of frame fragmentation (i.e., keeping FILS authentication to just 4 exchanges frames, even with certificates and piggy-backed info) How to recover objects?  Within single frame: separator symbol (‘  ’) allows unique recovery of multiple objects  Object spread over multiple frames: parse till ‘  ’-symbol found (assuming only one object to spread across) Note:  Up to implementation to partition to one’s needs  Representation with multiple ‘  ’-symbols in the end possible (“padding”) Slide 13Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Intra-Frame Fragmentation – Straw Poll #2 Represent “conceptual objects” as described in 13/311r1:  Introduce new Information Element (IE) for “conceptual object” type  Have conversion routine for Object as sequence of IEs (and for sequence of Objects)  Yes  No  “Don’t Care”  Need more information Result: Slide 14Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (1) General mechanism After AEAD protection Now with Information elements: or... Main problem: How to pinpoint the portions that are encrypted? (only problem for recipient) HeaderPayload Header Secured Payload Authentication of entire frame A A A A Encrypted segments starts here Slide 15Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (2) How to pinpoint the portions that are encrypted? (only problem for recipient) Recipient can easily find this “L”-symbol: simply parse received message (and remove this “L”-symbol) Does this also work for other “encryption ON/OFF” combinations? A A A L A “L” L 2  Encryption length indicator IE (4 octets) Slide 16Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (3) Does this also work for other “encryption ON/OFF” combinations? YES! Exploit structure in IEs: encryption/decryption is essentially on “unordered” set of IEs. Step massage in right form (split frame into “to be encrypted elements” and “other data”) Step encrypt and put “L”-symbol (encryption indicator IE) in place A A A Other data To be encrypted data 0A “L” Slide 17Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (4) Step find encryption indicator, length of encrypted segment, decrypt and verify authenticity, and remove “L”-symbol (NOTE: encryption indicator is always “on the left”) Step massage “decrypted data” and “other data”, so that IEs will be in ascending order A Other data Decrypted data 0A “L” 0A A Slide 18Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (5) What about complexity?  Step massage in right form (split frame into “to be encrypted elements” and “other data”) Scan data from left to right and partition string according to “Encryption ON/OFF” indication  Step massage “decrypted data” and “other data”, so that IEs will be in ascending order. Scan leftmost elements of two substrings and build combined string according to order IE Identifiers.  Step encrypt and authenticate and put “L”-symbol (encryption length indicator IE) in place  Step find encryption indicator, length of encrypted segment, decrypt and verify authenticity, and remove “L”-symbol A A Other data To be encrypted data 0A “L” 0A Slide 19Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (6) Summary: Flexible authenticated encryption scheme:  Sender has full control over which portions to encrypt (e.g., encryption of vendor-specific info, specific higher-layer objects)  Recipient can always decrypt-and-verify, irrespective of sender’s security policy Limited incremental cost:  Requires new 4-octet information element (“encryption indicator element”) This allows recipient to always easily find “encrypted data” and “other data”  Requires single left-to-right scan of string on sender’s and recipient’s side Implementation cost scan operation insignificant: *Scan on recipient’s side only after decrypt-and-verify, so no schedule impact *Scan on sender’s side may be trivial and can be anticipated by sender Notes: AEAD scheme described has minimal complexity, in the following sense:  Any AEAD scheme where one cannot statically determine size and/or location of “encrypted data” from frame itself requires introduction of “encryption indicator IE”  Any scheme where one wishes to have “encrypted data” together, so that AEAD crypto inputs can be easily determined,requires some type of “scan” operation Slide 20Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (7) Summary: Flexible authenticated encryption scheme:  Sender has full control over which portions to encrypt (e.g., encryption of vendor-specific info, specific higher-layer objects)  Recipient can always decrypt-and-verify, irrespective of sender’s security policy Implementation choices:  Any implementer who does not care about flexibility (i.e., its security policy is to always encrypts the entire frame), does not need to implement “scan” on sender’s side. In that case, encrypt-and-authenticate coincides with usual CCM mode.  Any implementer whose incoming frame processing considers IEs as a set, i.e., unordered, does not need to implement “scan” on recipient’s side. In that case, decrypt-and-verify coincides with usual CCM mode. Result: (“Best of both worlds”)  Implementers who do not like flexibility/generality can go their way  Implementation of “encryption indicator element” allows others who do like flexibility to go their way as well (“peaceful coexistence”) Slide 21Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption (8) Options: 1. No flexibility. Always encrypt FILS Association Request/Response “body” 2.Some flexibility. Allow only encryption of “first chunk”… No re-ordering of IEs at all. 3. Full flexibility. Allow encryption of any chunks, as set by senders policy… Potential re-ordering of IEs “under the hood”. Put “right” as part of AEAD routine. Details in 13/311r1. HeaderSecured Payload Header Secured Payload Visible Chunk “L” Header Secured Payload Visible Chunk “L” Slide 22Rene Struik (Struik Security Consultancy)

doc.: Submission May 13, 2013 Authenticated Encryption – Straw Poll #3 Implement flexible encryption scheme as specified in 13/311r1:  Introduce new Information Element (IE) as “security indicator element” (4-octets), so as to indicate length of encryption segment following  Facilitate Option #2 of previous Slide (#22).  For clarity: This only applies to FILS Association frames  Yes  No  “Don’t Care”  Need more information Result: Slide 23Rene Struik (Struik Security Consultancy)