Submission doc.: IEEE 11-12-0314r1 March 2012 Dan Harkins, Aruba NetworksSlide 1 The Pitfalls of Hacking and Grafting Date: 2012-03-08 Authors:

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0413r0 Submission March 2009 Dan Harkins, Aruba NetworksSlide 1 A Study Group for Enhanced Security Date: Authors:
Advertisements

Doc.: IEEE /1263r0 Submission November 2008 Dan Harkins, Aruba NetworksSlide 1 A Modest Proposal…. Date: Authors:
Doc.: IEEE /1012r0 Submission September 2009 Dan Harkins, Aruba NetworksSlide 1 Suite-B Compliance for a Mesh Network Date: Authors:
Secure Pre-Shared Key Authentication for IKE
Submission doc.: IEEE 11-12/0553r0 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Submission doc.: IEEE 11-13/0487r0 May 2013 Dan Harkins, Aruba NetworksSlide 1 How To Fragment An IE Date: Authors:
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /1160 Submission NameAffiliationsAddressPhone George CherianQualcomm 5775 Morehouse Dr, San Diego, CA, USA
Doc.: IEEE /0357r0 Submission March 2011 Marc Emmelmann, Fraunhofer FOKUSSlide 1 A focused path torwards TGai D1.0 Date: Authors:
Doc.: IEEE /0598r0 Submission May 2012 Steve Grau, Juniper NetworksSlide 1 Layer 3 Setup with Dynamic VLAN Assignment Date: Authors:
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Doc.: IEEE /2913r0 Submission November 2007 Kapil Sood, Intel CorporationSlide 1 Protecting Associations Attacks – Some Considerations Date:
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE 11-12/1253r1 November 2012 Dan Harkins, Aruba NetworksSlide 1 Why Use SIV for 11ai? Date: Authors:
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Doc.: IEEE /1042 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang, Kyungki,
Submission doc.: IEEE /1003r1 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Submission doc.: IEEE 11-12/0273r8 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE ai Submission Paul Lambert, Marvell TGai Discovery Proposal Author: Abstract Short high-level proposal for discovery techniques.
Submission doc.: IEEE /1003r2 July 2011 Hiroki Nakano, Trans New Technology, Inc.Slide 1 Upper Layer Data on Management frames Date:
Doc.: IEEE /1429r2 Submission January 2012 Dan Harkins, Aruba NetworksSlide 1 A Protocol for FILS Authentication Date: Authors:
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /0257r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /0374r0 Submission March 2010 Dan Harkins, Aruba NetworksSlide 1 Clarifying the Behavior of PMK Caching Date: Authors:
Doc.: IEEE ai Submission NameAffiliationsAddressPhone George Calcev Huawei Technologies Co., Ltd. huawei.com TGai.
Submission doc.: IEEE 11-14/0062r0 January 2014 Dan Harkins, Aruba NetworksSlide 1 PMK Caching for FILS Date: Authors:
Submission doc.: IEEE /1128r1 September 2015 Dan Harkins, Aruba Networks (an HP company)Slide 1 Opportunistic Wireless Encryption Date:
Doc.: IEEE /0123r0 Submission January 2009 Dan Harkins, Aruba NetworksSlide 1 Secure Authentication Using Only A Password Date:
Submission doc.: IEEE 11-12/0553r4 May 2012 Jarkko Kneckt, NokiaSlide 1 Response Criteria of Probe Request Date: Authors:
Doc.: IEEE / ai Submission NameAffiliationsAddressPhone Phillip BarberHuawei Technologies Co., Ltd Alma Rd, Ste 500 Plano,
Submission doc.: IEEE /1034r4 September 2012 Jeongki Kim, LG ElectronicsSlide 1 Enhanced scanning procedure for FILS Date: Authors:
Doc.: IEEE /1233r3 Submission Sep 2011 Slide 1 Passive Scanning Improvement Date: Authors:
Doc.: IEEE /1109r0 Submission Month Year Tom Siep, CSRSlide 1 Amendment Creation Process Date: YYYY-MM-DD Authors:
Submission doc.: IEEE ai May 2012 Lei Wang, InterDigital CommunicationsSlide 1 Proposed SFD Text for ai AP/STA Initiated FILS Optimizations.
Submission doc.: IEEE 11-12/535r1 May 2012 Jarkko Kneckt, NokiaSlide 1 Scanning and FILS requirements Date: Authors:
Doc.: IEEE /1042r1 Submission NameAffiliationsAddressPhone Giwon ParkLG Electronics LG R&D Complex 533, Hogye- 1dong, Dongan-Gu, Anyang,
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Doc.: IEEE /0010r1 Submission NameAffiliationsAddressPhone Hitoshi MORIOKAAllied Telesis R&D Center Tenjin, Chuo-ku, Fukuoka
Doc.: IEEE /0057r0 Submission January 2010 Dan Harkins, Aruba NetworksSlide 1 [place presentation subject title text here] Date: Authors:
Submission doc.: IEEE 11-12/0273r7 May 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /0448r0 Submission March, 2007 Srinivas SreemanthulaSlide 1 Joiint TGU : Emergency Identifiers Notice: This document has been.
Doc.: IEEE /1015r1 Submission Gabor Bajko, Nokia, Canpolat, Intel, Emmelmann, FOKUSSlide 1 Network Selection Optimization Date:
Doc.: IEEE /0896r0 SubmissionJae Seung Lee, ETRISlide 1 Probe Request Filtering Criteria Date: July 2012.
Submission doc.: IEEE 11-12/0273r5 March 2012 Hiroki Nakano, Trans New Technology, Inc.Slide 1 SFD Text for Upper Layers Date: Authors: NameAffiliationsAddressPhone .
Doc.: IEEE /1212r0 Submission September 2011 IEEE Slide 1 The Purpose and Justification of WAPI Comparing Apples to Apples, not Apples to.
Doc.: IEEE /xxxr0 Submission Nov Jonathan Segev (Intel)Slide 1 Rapid Scanning Procedure Date: Authors:
Doc.: IEEE /1426r02 Submission NameAffiliationsAddressPhone ChengYan FengZTE Corporation No.800, Middle Tianfu Avenue, Hi-tech District,
Submission doc.: IEEE /313r1 March 2016 Guido R. Hiertz, Ericsson et al.Slide 1 The benefits of Opportunistic Wireless Encryption Date:
Doc.: IEEE /484r0 Submission NameAffiliationsAddressPhone George Cherian Santosh Abraham Qualcomm 5775 Morehouse Dr, San Diego, CA, USA +1.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Authentication and Upper-Layer Messaging
Enhanced Security Features for
Proposed SFD Text for ai Link Setup Procedure
PAD and Probe Request/Response frames
Discussions on FILS Authentication
FILS presentation on High Level Security Requirements
Enhanced Security Features for
Opportunistic Wireless Encryption
How To Fragment An IE Date: Authors: May 2013
Proposed Modifications to e-D4.0 Direct Link Protocol
Security Properties Straw Polls
Changes to SAE State Machine
AP Status Broadcast Date: Authors: November 2011
Dan Harkins Trapeze Networks
Cooperative AP Discovery
A Better Way to Protect APE Messages
Reducing Overhead in Active Scanning
Reducing Overhead in Active Scanning
Presentation transcript:

Submission doc.: IEEE r1 March 2012 Dan Harkins, Aruba NetworksSlide 1 The Pitfalls of Hacking and Grafting Date: Authors:

Submission doc.: IEEE r1 March 2012 Dan Harkins, Aruba NetworksSlide 2 Abstract This submission describes the drawbacks to a seemingly attractive behavior

Submission doc.: IEEE r1 Protocol Grafting Desire to use what exists today Someone else spent time and money developing it It may have been vetted Take advantage of wide deployment (if it exists) Sometimes the fit is not exact A re-used protocol ends too abruptly to use directly The “wrong side” begins the exchange So we graft protocols Add messages to an existing protocol to “sync” it up; or, The combined protocol stops being request/response where the server ends one protocol by sending a message to the client and immediately begins a second by sending another message to the client Slide 3Dan Harkins, Aruba Networks March 2012

Submission doc.: IEEE r1 Protocol Grafting in Today networks are client initiated The AP responds to queries but no client state exists until a client asks to establish some 802.1X/EAP is initiated by the infrastructure At “link-up” the Authenticator begins its state machine to authenticate the client RSN defines “link-up” to be entering Authenticated and Associated state After authentication request/response and association request/response, 802.1X Authenticator begins its state machine to authenticate the client (using data frames) defines its own Authenticator (in addition to 802.1X) to provide proof-of-possession assurance and derive link-specific keys Slide 4Dan Harkins, Aruba Networks March 2012

Submission doc.: IEEE r1March 2012 Dan Harkins, Aruba NetworksSlide 5 One Premise Promulgated in 11ai There are “frameworks” we need to reuse A framework is (according to wikipedia) “a reusable set of libraries or classes for a software system”. In this case it should be a reusable set of protocols. The EAP framework It’s been deployed It kind of works People are comfortable with it The dot1x framework Necessary for doing EAP on an network See above We need to do some more protocol grafting to use these “frameworks” in a Fast manner for Initial Link Set-up

Submission doc.: IEEE r1March 2012 Dan Harkins, Aruba NetworksSlide 6 Using These Frameworks in ai Fewer messages are needed– have to consolidate messages and modify their semantics, but: is still client initiated – protocol starts with a client message Network authentication is server initiated– AP sends Requests, client sends Responses Optimized EAP proposes the following grafting: Do away with first message from Authenticator Encapsulate EAP in authentication frames Switch from authentication frames to association frames with last EAP-Response Put Authenticator information in frames containing EAP

Submission doc.: IEEE r1 Problems with Optimized EAP EAP is a lock-step Request/Response protocol Each Request gets one and only one Response A Response with no Request is forbidden by EAP (RFC 3748)! EAP client must know about its transport now 802.1X defines a protocol state machine to authenticate clients using an EAP server AP no longer implements 802.1X Authenticator state machine Authenticator can no longer be purely pass-thru since it must parse some EAP frames and pass-thru others Additional weird error conditions What does the Authenticator do if the EAP server responds to the EAP Response in the Assoc-Req with another EAP Request? Fundamentally, Optimized EAP is a hack Slide 7Dan Harkins, Aruba Networks March 2012

Submission doc.: IEEE r1 Problems with Optimized EAP “We must re-use the ‘EAP framework’ in FILS” Yet it requires changes to the EAP protocol and the EAP state machine such that it is no longer EAP “We must re-use the ‘802.1X framework’ in FILS” Yet it does not use 802.1X frames Yet it requires changes to the 802.1X protocol and 802.1X state machines such that it is no longer 802.1X It voids the premise that supposedly required it in the first place! It requires changes to implementations of EAP and 802.1X that wish to be “optimized” such that those protocols are no longer being used It’s not re-using any sets of protocols– i.e. not re-using “frameworks” If you have to change both sides it’s a new protocol Slide 8Dan Harkins, Aruba Networks March 2012

Submission doc.: IEEE r1 Grafting a Hack It’s inelegant Existing semantics and syntax have lost their meaning It’s complicated Complicated in a security protocol is a recipe for disaster Its attraction is deceptive We get to re-use all this existing code!…except we really don’t Its benefit is illusory We still have to touch every single client and every single AP Slide 9Dan Harkins, Aruba Networks March 2012

Submission doc.: IEEE r1 A Modest Proposal (that’s not a motion) Abandon the idea of Optimized EAP Let’s just drop the pretense and create a new protocol. Slide 10Dan Harkins, Aruba Networks March 2012