Download presentation
Presentation is loading. Please wait.
Published byCharla Barker Modified over 8 years ago
1
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-05.txt Bernard Aboba Microsoft IETF 62, Minneapolis, MN
2
Outline Requirements Issues Summary Proposed Resolutions
3
The Requirements Outlined by Russ Housley at IETF 56 All AAA WG documents doing key distribution need to meet these requirements EAP Key Management Framework document chartered to analyze the security of the EAP system
4
Acceptable solution MUST… (Housley, IETF 56) Be algorithm independent protocol For interoperability, select at least one suite of algorithms that MUST be implemented Establish strong, fresh session keys Maintain algorithm independence Include replay detection mechanism Authenticate all parties Maintain confidentiality of authenticator NO plaintext passwords
5
Acceptable solution MUST also … Perform client and NAS authorization Maintain confidentiality of session keys Confirm selection of “best” ciphersuite Uniquely name session keys Compromise of a single NAS cannot compromise any other part of the system, including session keys and long-term keys Bind key to appropriate context
6
Issues Summary 7 Issues filed since IETF 61 Type 1 Editorial (277) 6 Technical (254, 279, 288, 289, 291, 292) Status Accept – 57% (254, 288, 289, 292) Reject – 0% Open – 43% (277, 279, 291)
7
Proposed Resolution to Issue 277 - Organization Problems Document mixes discussion of existing technology with analysis of potential future extensions. Causes confusion about how current implementations behave. Document touches on proposed extensions only briefly and does not analyze them for compliance with the security criteria. Proposals may not be accurately stated. Suggested Resolution: Split the document into two parts EAP Key Management Framework: Goal is to document and analyze existing applications (e.g. RADIUS/EAP, Diameter EAP, 802.11i) and implementations. EAP Key Management Extensions: Focus on documenting and analyzing extensions to EAP key management.
8
Issue 277 (cont’d) Suggested breakdown: Key management framework Section 1 Section 2 (minus AMSK and pre-emptive key derivation) Section 3 (EAP-Key SA) Section 4: Key Management (minus speculative material) Section 5: Handoff Support (minus speculative material) Section 6: Security Considerations Section 7: Security Requirements Key management extensions Section 2.4 (AMSK derivation) Section 3.2 (EAP-Key SA) Section 4 (Speculative Material) Section 5 (Speculative Material)
9
Proposed Resolution Issue 279 – Requirements Requirements document submitted by Jesse Walker Needs to be integrated with Section 7. Volunteer to review this submission + Section 7 and ferret out the high level requirements?
10
Issue 291 – Key Cache Synchronization Change submitted by Jari Arkko, noting disadvantages of method-specific key lifetime negotiation. Proposal: Accept. Any objections?
11
An Architectural Issue How is the EAP key cache managed on the peer and authenticator? To date, key names and cache architectures have been “link specific” What happens when a host is multi-homed? Example: 802.16, 802.11, 802.20 interfaces Do we now have separate EAP key caches for each media? For each interface? Do we now have distinct key names for the same key, one for each media/interface? How does this impact inter-media handoff, code footprint, and complexity?
12
A solution Media Independence The EAP key cache is media independent and is managed at or above the EAP layer. Implication: all media should use EAP key names to manage cache entries. What about PSK support? What about the key name format? Does an ASCII format make sense?
13
Roadmap Produce split strawman based on -05 Post strawman links to the EAP WG list File additional issues on proposed changes Resolve issues Submit the split documents to the archive: Draft-ietf-eap-keying-06.txt Draft-ietf-eap-keying-ext-00.txt Bring key management framework document to EAP WG last call by IETF 63.
14
Feedback?
Similar presentations
© 2025 SlidePlayer.com. Inc.
All rights reserved.