Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

802.1AF - directions define requirements to find and create connections in terms of Discovery - Authentication - Enable 1.Discover of what can be done.
Internet Protocol Security (IP Sec)
EAP Channel Bindings TF-MNM Lyon, February 16, 2011 Alan DeKok FreeRADIUS.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
EAP Channel Bindings Charles Clancy Katrin Hoeper IETF 76 Hiroshima, Japan November 08-13, 2009.
Chapter 14 From Cryptography and Network Security Fourth Edition written by William Stallings, and Lecture slides by Lawrie Brown, the Australian Defence.
1 Digital Signatures & Authentication Protocols. 2 Digital Signatures have looked at message authentication –but does not address issues of lack of trust.
TCG Confidential Copyright© 2005 Trusted Computing Group - Other names and brands are properties of their respective owners. Slide #1 TNC EAP IETF EAP.
EAP-TTLS Status draft-funk-eap-ttls-v0-00.txt draft-funk-eap-ttls-v1-00.txt draft-funk-tls-inner-application-extension-01.txt Paul Funk Funk Software.
Apr 2, 2002Mårten Trolin1 Previous lecture On the assignment Certificates and key management –Obtaining a certificate –Verifying a certificate –Certificate.
Jesse Walker, keying requirements1 Suggested Keying Requirements Jesse Walker Intel Corporation
802.1x EAP Authentication Protocols
Encapsulation Security Payload Protocol Lan Vu. OUTLINE 1.Introduction and terms 2.ESP Overview 3.ESP Packet Format 4.ESP Fields 5.ESP Modes 6.ESP packet.
CMSC 414 Computer (and Network) Security Lecture 25 Jonathan Katz.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—3-1 Wireless LANs Understanding WLAN Security.
CMSC 414 Computer and Network Security Lecture 13 Jonathan Katz.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
Diameter End-to-End Security: Keyed Message Digests, Digital Signatures, and Encryption draft-korhonen-dime-e2e-security-00 Jouni Korhonen, Hannes Tschofenig.
EAP Mutual Cryptographic Binding draft-ietf-karp-ops-model-03 draft-ietf-karp-ops-model-03 S. Hartman M. Wasserman D. Zhang.
Mobile IP Traversal Of NAT Devices By, Vivek Nemarugommula.
Wireless and Security CSCI 5857: Encoding and Encryption.
21-07-xxxx IEEE MEDIA INDEPENDENT HANDOVER DCN: Title: MIH Protocol Security Date Submitted: December, 2007 Presented.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
1 /10 Pascal URIEN, IETF 66 h, Wednesday July 12 th,Montreal, Canada draft-urien-badra-eap-tls-identity-protection-00.txt
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
Chapter 21 Distributed System Security Copyright © 2008.
KAIS T Wireless Network Security and Interworking Minho Shin, et al. Proceedings of the IEEE, Vol. 94, No. 2, Feb Hyeongseop Shim NS Lab, Div. of.
EAP Key Framework Draft-ietf-eap-keying-01.txt IETF 58 Minneapolis, MN Bernard Aboba Microsoft.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
sec1 IEEE MEDIA INDEPENDENT HANDOVER DCN: sec Title: TGa_Proposal_Antonio_Izquierdo (Protecting the Information Service.
July 16, Diameter EAP Application (draft-ietf-aaa-eap-02.txt) on behalf of...
Doc.: IEEE /0498r0 Submission April 2008 Eldad Perahia, Intel CorporationSlide 1 Modifications to the 60GHz PAR & 5 C’s Proposal Date:
July 16, 2003AAA WG, IETF 571 EAP Keying Framework Draft-aboba-pppext-key-problem-07.txt EAP WG IETF 57 Vienna,
© 2006 Cisco Systems, Inc. All rights reserved. Network Security 2 Module 4: Configuring Site to Site VPN with Pre-shared keys.
Link-Layer Protection in i WLANs With Dummy Authentication Will Mooney, Robin Jha.
EAP-PSK v8 IETF 63 – Paris, France August EAP-PSK: an independent submission to IESG Requested EAP method type number allocation Reviewed June 2005.
November 2005IETF 64, Vancouver, Canada1 EAP-POTP The Protected One-Time Password EAP Method Magnus Nystrom, David Mitton RSA Security, Inc.
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
Internet Key Exchange IKE ● RFC 2409 ● Services – Constructs shared authenticated keys – Establishes shared security parameters – Common SAs between IPSec.
PPP Configuration.
Wireless security Wi–Fi (802.11) Security
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
IETF 57 PANA WG PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt) Dan Forsberg, Yoshihiro Ohba, Basavaraj Patil, Hannes Tschofenig, Alper Yegin.
IP Multicast Receiver Access Control draft-atwood-mboned-mrac-req draft-atwood-mboned-mrac-arch.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
SSL(HandShake) Protocol By J.STEPHY GRAFF IIM.SC(C.S)
Washinton D.C., November 2004 IETF 61 st – mip6 WG MIPv6 authorization and configuration based on EAP (draft-giaretta-mip6-authorization-eap-02) Gerardo.
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
August 2, 2005IETF63 EAP WG AAA-Key Derivation with Lower-Layer Parameter Binding (draft-ohba-eap-aaakey-binding-01.txt) Yoshihiro Ohba (Toshiba) Mayumi.
MIP6 RADIUS IETF-72 Update draft-ietf-mip6-radius-05.txt A. LiorBridgewater Systems K. ChowdhuryStarent Networks H. Tschofenig Nokia Siemens Networks.
Doc.: IEEE /1145r1 Submission August WG Slide 1 Mutual Authentication Date: Authors: Slide 1.
IP Security (IPSec) Matt Hermanson. What is IPSec? It is an extension to the Internet Protocol (IP) suite that creates an encrypted and secure conversation.
@Yuan Xue CS 285 Network Security Secure Socket Layer Yuan Xue Fall 2013.
DOTS Requirements Andrew Mortensen November 2015 IETF 94 1.
August 4, 2004EAP WG, IETF 601 Authenticated service identities for EAP (draft-arkko-eap-service-identity-auth-00) Jari Arkko Pasi Eronen.
Port Based Network Access Control
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
CAPWAP Threat Analysis
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
PANA Discussion and Open Issues (draft-ietf-pana-pana-01.txt)
Katrin Hoeper Channel Bindings Katrin Hoeper
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Maryna Komarova (ENST)
PEKM (Post-EAP Key Management Protocol)
Agenda retrospective - B. Aboba Lunch
Presentation transcript:

Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper

Definition EAP channel bindings (c.b.) (as defined in the drafts) provide a consistency check of information advertized to peer and known by the authentication server from an authenticator acting as a pass-through device during an EAP session.

Goals Bind information advertized by an authenticator to the channel and verify its consistency to prevent attacks by rogue authenticators. –E.g. prevent “lying NAS attacks”

Proposed Method Phase 1. Information exchange –Peer sends info 1 to server –[Server sends info 2 to peer] Phase 2. Consistency check –Server verifies consistency and sends result to peer –[Peer verifies consistency and fails if inconsistent]

Data Exchange I-D.clancy-emu-aaapay –Defines way to encapsulate arbitrary Diameter AVPs in the protected channels of existing EAP methods –Includes GPSK, PSK, PAX, TTLS, FAST Channel binding information encoded in Diameter AVPs (or RADIUS TLVs using backward compatibility) Data exchanged as part of EAP messages in end-to-end integrity-protected channel

Design Choices Server performs consistency check Explicit data exchange and verification –As opposed to implicit, e.g. by hashing identity and other information directly into keys Benefits: 1.Enterprise: server more likely to be capable of recognizing whether different addresses belong to same device 2.Service Provider: more likely to know details of contractual roaming agreements 3.Easy add-on solution for EAP methods: no modifying EAP key derivations, message flow or state machine nor adding new algorithms or messages 4.Allows for fuzzy comparisons

Binding Information Exact parameters to bind are open to discussion Document provides placeholders for some EAP lower layers –IEEE SSID, BSSID, RSN IE (if present) –IKEv2, IEEE and other EAP lower layers TBD

Our Trust Model Honest peer & authentication server; may be dishonest authenticator Trust relationships 1.server trusts that info 1 = info 1 ’ 2.peer trusts result 3.server trusts stored info 2 EAP peer Authentication Server Authenticator info 1 (NAS) info 1 ' [info 2 ], result info 2

EAP Method Requirements Peer ↔ AS trust relationship can be established by any EAP method with the following properties: –mutual authentication between peer and server –derivation of keying material including an integrity key –info 1 sent from peer to server over end-to-end integrity-protected channel –result (and optionally info 2 ) sent from server to peer over end-to-end integrity-protected channel

System Assumptions Assume server maintains protected database of info 2 Consistency check requires server to be capable of comparing provided information –Enterprise: validate information on a per- authenticator basis –Service Provider: validate information on a per-network basis Both must be ensured outside EAP

Future Work It’s a start, but much works remains to be done: –message flow, incl. EAP-success/failure cases –example attacks –binding information –security considerations –…

Questions? Comments?