Doc.: IEEE 802.11-01/553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE 802.11 Tgi Tim Moore Bernard Aboba.

Slides:



Advertisements
Similar presentations
Virtual Trunk Protocol
Advertisements

Security Issues In Mobile IP
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Doc.: IEEE /178 Submission July 2000 A. Prasad, A. Raji Lucent TechnologiesSlide 1 A Proposal for IEEE e Security IEEE Task Group.
Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
IEEE i: A Retrospective Bernard Aboba Microsoft March 2004.
Doc.: IEEE /252 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 Issues with the 802.1X State Machine IEEE 802.1X Revision PAR Bernard Aboba.
IEEE P802 Handoff ECSG Submission July 2003 Bernard Aboba, Microsoft Detection of Network Attachment (DNA) and Handoff ECSG Bernard Aboba Microsoft July.
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
Mobile IP Outline Intro to mobile IP Operation Problems with mobility.
Mobile and Wireless Computing Institute for Computer Science, University of Freiburg Western Australian Interactive Virtual Environments Centre (IVEC)
Kerberos 1 Public domain image of Heracles and Cerberus. From an Attic bilingual amphora, 530–520 BC. From Italy (?).
Doc.: IEEE /095r0 Submission January 2003 Dan Harkins, Trapeze Networks.Slide 1 Fast Re-authentication Dan Harkins.
Doc.: IEEE /689r0 Submission November 2002 Dan Harkins, Trapeze Networks.Slide 1 Re-authentication when Roaming Dan Harkins.
Doc.: IEEE /243r0 Submission March 2002 James Kempf, DoCoMo LabsSlide and IP James Kempf Seamoby WG Co-chair DoCoMo Labs USA
Doc.: r0-I Submission July 22, 2003 Paul Lambert, Airgo NetworksSlide 1 Enabling Encryption in Hotspots by Decoupling the Privacy Field from.
Doc.: IEEE /253 Submission May 2001 Bernard Aboba, MicrosoftSlide 1 WEP2 Security Analysis Bernard Aboba Microsoft.
URP Usage Scenarios for NAS Yoshihiro Ohba August 2001 Toshiba America Research, Inc.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Doc.: IEEE /0408r0 Submission March 2004 Colin Blanchard, BTSlide 1 3GPP WLAN Interworking Security Colin Blanchard British Telecommunications.
802.1x EAP Authentication Protocols
An Initial Security Analysis of the IEEE 802.1x Standard Tsai Hsien Pang 2004/11/4.
Ariel Eizenberg PPP Security Features Ariel Eizenberg
IEEE Wireless Local Area Networks (WLAN’s).
Chapter 5 Secure LAN Switching.  MAC Address Flooding Causing CAM Overflow and Subsequent DOS and Traffic Analysis Attacks.
IEEE Wireless LAN Standard
Wireless Network Security. Wireless Security Overview concerns for wireless security are similar to those found in a wired environment concerns for wireless.
July 16, 2003AAA WG, IETF 571 AAA WG Meeting IETF 57 Vienna, Austria Wednesday, July 16,
VPN Wireless Security at Penn State Rich Cropp Senior Systems Engineer Information Technology Services The Pennsylvania State University © All rights.
1 Chapter06 Mobile IP. 2 Outline What is the problem at the routing layer when Internet hosts move?! Can the problem be solved? What is the standard solution?
Wireless and Security CSCI 5857: Encoding and Encryption.
EAP WG EAP Key Management Framework Draft-ietf-eap-keying-03.txt Bernard Aboba Microsoft.
Doc.: IEEE /0476r3 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /137r2 Submission June 2000 Tim Godfrey, IntersilSlide 1 TGe Requirements Version r2 8 June 2000.
Authentication Mechanism for Port Control Protocol (PCP) draft-wasserman-pcp-authentication-01.txt Margaret Wasserman Sam Hartman Painless Security Dacheng.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /0476r2 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Pre-Keying Jesse Walker and Emily Qi Intel Corporation.
Doc.: IEEE /035 Submission March 2000 Bernard Aboba, Tim Moore, MicrosoftSlide 1 IEEE 802.1X For Wireless LANs Bernard Aboba, Tim Moore, Microsoft.
Doc.: IEEE /0638r0 Submission May 2004 Bernard Aboba, MicrosoftSlide 1 Network Selection Bernard Aboba Microsoft
Doc.: IEEE /0158r2 Submission TGaq Pre-Association Discovery Protocol for ANDSF Discovery Service Date: May 2014 Joe Kwak, InterDigitalSlide.
Doc.: IEEE /562r1 Submission November 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba.
Doc.: IEEE r Submission November 2004 Bob Beach, Symbol TechnologiesSlide 1 Fast Roaming Using Multiple Concurrent Associations Bob.
Securing Passwords Against Dictionary Attacks Presented By Chad Frommeyer.
Lecture 24 Wireless Network Security
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Wireless security Wi–Fi (802.11) Security
Doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.
Doc.: IEEE k Submission July 2004 Bernard Aboba, MicrosoftSlide 1 IEEE k Security: A Conceptual Model Bernard Aboba Microsoft.
Mobile IP THE 12 TH MEETING. Mobile IP  Incorporation of mobile users in the network.  Cellular system (e.g., GSM) started with mobility in mind. 
Robust Security Network (RSN) Service of IEEE
Open issues with PANA Protocol
RADEXT WG RADIUS Attributes for WLAN Draft-aboba-radext-wlan-00.txt
Authentication and Upper-Layer Messaging
802.1X and key interactions Tim Moore November 2001
MAC Address Hijacking Problem
PEKM (Post-EAP Key Management Protocol)
Jesse Walker and Emily Qi Intel Corporation
Secure Roaming IEEE Tgi Bernard Aboba Tim Moore Microsoft
Tim Moore, Microsoft Corporation Clint Chaplin, Symbol Technologies
Roaming timings and PMK lifetime
Responses to Clause 5 Comments
Roaming timings and PMK lifetime
Roaming timings and PMK lifetime
Presentation transcript:

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticated Fast Handoff IEEE Tgi Tim Moore Bernard Aboba Microsoft

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Why Do We Care About Fast Handoff? is becoming popular on small devices –PDAs, phones, not just laptops Multimedia applications sensitive to connectivity loss –Audio, Video TCP sensitive to multiple losses –Loss of an entire window will cause connection to go into slow-start fast handoff is fast, simple and insecure –Authentication occurs prior to reassociation so pre-authentication is possible –Management frames are not authenticated, no cryptographic operations in critical path –If all APs use the same WEP key, no inter-AP communication is required 802.1X support complicates fast handoff –STAs have dynamic per-session keys –With 802.1X, authentication occurs after reassociation, not before If re-authentication is required, STAs need to complete authentication conversation before recovering connectivity –Authentication and key management methods requiring public key operations (e.g. EAP-TLS) can take several seconds to complete –TLS continuation can decrease round-trips (from 3.5 to 2.5) Disconnection time is still significant, particularly if backend authentication server is far away (e.g. hotspot scenarios).

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Fast Handoff Scenarios Enterprise – wireless access within a corporate campus –VLANs may be implemented –Authentication may involve passwords, smartcards, token cards, OTP, etc. –User authenticates to an authentication server on the same campus Hot Spot – wireless access in airports, hotels, cafes –Authentication is typically password-based Account at wireless ISP Wholesale wireless access to corporations may eventually become popular –VLANs typically not implemented –User authenticates to the home authentication server, which may be far away

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Goals for Authenticated Fast Handoff Fast –Transfer times on order of 20 ms or less, not seconds –No need to reauthenticate after each reassociation –Support for complete context transfer (including VLANID) for seamless user experience Secure –Support for per-session keys, dynamic key generation –Works with all EAP authentication methods –Secure reassociation requests and responses, as well as disassociation notifications –Protection against spoofing, denial of service, hijacking Deployable –Enable deployment of inter-access point protocol (IAPP) without a registration service

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Security improvements

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft State 1 Unauthenticated, Unassociated State 2 Authenticated, Unassociated State 3 Authenticated, and Associated Successful MAC layer Authentication Successful Association or Reassociation Disassociation Notification DeAuthentication Notification Deauthentication notification Class 1 Frames Class 1 & 2 Frames Class 1, 2 & 3 Frames Classic State Machine

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Classic: Implications for Fast Handoff Classic authentication occurs before reassociation –Enables a STA to pre-authenticate with the new AP prior to reassociation Inter-Access Point communication typically not necessary –If all APs use the same key, new AP can validate the STA authentication without contacting the old AP. Ability for STAs to quickly reassociate between access points –STA sends Disassociate to old AP after it receives Reassociation-Response from new AP –New AP install STA state in DS after receiving an ACK of the Reassociation-Response from STA –No cryptographic operations in the critical path Management frames are not authenticated –Association-Request/Response, Reassociation-Request/Response, Disassociation notification are unauthenticated –Enables an attacker to forge these and other management frames, take over sessions

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Classic Fast Handoff STAAP old AP new Associate-Request Associate-Response ACK DS Notified Reassociate-Request Reassociate-Response ACK DS Notified Disassociate Note: Authentication not on critical path, so not included Transition Period ~ STA-AP

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft State 1 Unauthenticated, Unassociated State 2 Authenticated, Unassociated State 3 Authenticated, and Associated Successful MAC layer Authentication Successful Association or Reassociation Disassociation Notification DeAuthentication Notification Deauthentication notification Class 1 Frames + ESN Class 2 frames Class 1 & 2 Frames Class 1, 2 & 3 Frames i State Machine State 4 ESN Associated ESN Association or Reassociation ESN Disassociation Notification Class 1, 2 & 3 Frames except Authentication & Deauthentication

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft i: Implications for Fast Handoff With 802.1X, upper layer authentication occurs after ESN association/reassociation –802.1X state machine is driven by association/reassociation events –AP can only be associated with a single STA; since 802.1X authentication occurs after reassociation, an ESN STA can only authenticate to a single ESN AP Full reauthentication to each AP a significant cost –802.1X authentication may involve multiple round-trips, public key operations –Environments with many mobile stations can heavily load the backend authentication server –Desirable to avoid a full reauthentication at every AP Need to lock all doors left open by classic – i adds dynamic keying (802.1X), credible ciphersuite (AES), but… –Need to address other security holes such as unauthenticated management frames Cryptographic operations now in the critical path for Fast Handoff –ESN reassociated STA cannot access the controlled port of the ESN AP until upper layer authentication completes –Authentication of Reassociation-Request/Response, Disassociation required to prevent hijacking

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Questions Should authentication occur before or after reassociation? How do we authenticate management frames? –This presentation addresses Reassociation- Request/Response, and Disassociation Notification frames –Future work will address authentication of other Management Frames Association-Request/Response, Beacon, Probe- Request/Response, Deauthentication, ATIM

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Alternatives Authentication before reassociation –Pros Enables pre-authentication Authentication no longer in the critical path for reassociation –Cons If you authenticate management frames, cryptographic operations remain in the critical path (since you need to authenticate the Reassociation Request/Response) If youre already authenticating reassociation request/response, why do more than canned authentication in addition? Reassociation before Authentication –Pros Simplicity: authenticate Reassociation-Request/Response, Disassociation, AP issues canned success in upper layer authentication if authentication is successful at MAC layer Minimizes cryptographic operations in the critical path for reassociation –Cons No pre-authentication

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Proposed Approach Authentication of Reassociate, Disassociate frames –Authenticator Information Element added to Reassociation- Request/Response, Disassociation notification frames –Authenticator Information Element enables STA and new AP to provide possession of the unicast authentication session key negotiated with the old access point. Support within the Inter-Access Point Protocol (IAPP) –New AP passes the Authenticator IE to the with old AP in the Inter-Access Point Protocol (IAPP) Move-Request –Old AP validates the Authenticator –If successfully validated, old AP sends IAPP Move-Response to new AP –Otherwise, old AP silently discards IAPP Move-Request New AP will not send Reassociation-Response STA Reassociation-Request will time out STA, AP will re-authenticate Appropriate f MIB variable is incremented –802.1X canned success sent from AP to STA if Authenticator IE included within the Reassociation-Request is valid.

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft i Fast Handoff STAAP old AP new Associate-Request Associate-Response ACK DS Notified Reassociate-Request (Authenticated) Reassociate-Response (Authenticated) ACK DS Notified Disassociate (Authenticated) Transition Period ~ RTT STA-AP 802.1X/Identity Request EAP-Success 802.1X/Identity Response EAP-Request EAP-Response Transition Period ~ nRTT STA-AP n =3.5 (TLS), 2.5 (TLS continuation)

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticator Information Element Assumes that a unicast key is available either for the current AP (Disassociation, Reassociation- Response messages), or with the previous AP (Reassociation-Request message). Authenticator = HMAC-MD5(STA MAC address | AP MAC address | Timestamp, key) –Timestamp = 8 octet timestamp (see Section ) to prevent replay –The authentication session key derived from the negotiated master key is used (same key as is used to authenticate the EAPOL-Key message)

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Authenticator Information Element | Element ID | Length | Algorithm |Authenticator | Authenticator Element ID: TBD Length: 19 = HMAC-MD5 Algorithm –1 = HMAC-MD5 Authenticator –For Algorithm=1, 128-bit HMAC-MD5(STA MAC address | AP MAC address | Timestamp, key) –Authentication key = session key used to authenticate the EAPOL-Key message

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Deployability improvements

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft The Registration Problem New AP contacts the old AP via IAPP to validate the reauthentication- request, transfer context IAPP runs over IP –Implication: New AP needs the IP address of the old AP in order to communicate with it enables the STA to obtain the MAC address of the old & new APs –Client obtains the MAC address of the old AP when it associates/re- associates with it –Client provides the new AP with the MAC address of the old AP in the re-association request But how does the new AP locate the old AP IP address? –New AP knows the MAC address of the old AP, not its IP address –Need a way to map the MAC address to an IP address

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Alternate Solutions to the Registration Problem 1.Inverse ARP (RFC 2390) –Assumes APs are all on the same subnet, so not a general solution –Note: Having APs on different subnets does not imply change of subnet for the client (possible for the AP to support dynamic VLANs) 2.AAA protocols Authentication server knows where APs are, but… AAA protocols werent designed to solve this problem 3.Registration Service (whats in TgF Draft 2) Problems: –Enterprise customers do not wish to deploy yet another service –Selecting an AP to run the service requires an election protocol –Registration service designs discussed so far (SLPv2, DNS) have serious flaws 4.Include AP IP address(es) in management messages –IP address(es) of new AP provided to STA in association-response, reassociation- response –STA provides IP address(es) of old AP to new AP in reassociation-request Recommendation: Choice 4 –Eliminates need for registration service (and resulting deployment problems)

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Issues with use of SLPv2 for Registration Service SLPv2 designed for use in service discovery, not resolving MAC addresses to IP addresses –Use of SLPv2 as a routable version of InverseARP is inefficient SLPv2 requires multicast routing to all access points; not widely deployed SLPv2 limited to use within a single administrative domain – prevents context transfer between domains –Inter-domain context transfer should not be prohibited in situations where the trust issues can be worked out For scalability, SLPv2 requires deployment of Directory Agents (DAs) SLPv2 security is inflexible –Requires certificate infrastructure –Supports only DSA signatures (RSA much more widely used) –No known implementations

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Issues with use of DNS for Registration Service DNS not designed as a mechanism for translating MAC addresses to IP Addresses Would require addition of a MAC address record to DNS –DNSEXT WG unlikely to agree to this (its a bad idea!) –DHCPID RR based on a hash of the MAC address –DHCPID RR not to be used for alternative purposes Would require APs, DNS servers to support new DNS record types as well as DNS dynamic update DNS dynamic update not yet widely deployed Secure dynamic update implementations not yet interoperable –Use by APs would require trust between APs and DNS Server

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Extended Address Information Element Added to Association-Response, Reassociation- Request and Reassociation-Response messages Multiple Extended Address Information Elements can be included if the AP has multiple addresses (IPv4, IPv6, etc.) New AP provides address(es) to STA in Association- Response and Reassociation-Response messages STA provides new AP with address(es) of old AP in the Reassociation-Request message AP uses the address(es) to determine the destination for the Move-Request message sent to the old AP.

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Extended Address Information Element | Element ID | Length | Type | Address | Address Element ID: TBD Length: 7 = IPv4, 19 = IPv6 Type: from Address Family Numbers in RFC 1700 –1 = IPv4 –2 = IPv6 Address –For Type=1, 32-bit IPv4 address –For Type=2, 128-bit IPv6 address

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft New Status Codes Status codeMeaning TBDReassociation-Request denied due to failed authenticator TBDReassociation-Response denied due to failed authenticator TBDDisassociation denied due to failed authenticator

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Motion To amend the TGi draft to include text detailing usage of the Extended Address and Authenticator Information Elements.

doc.: IEEE /553r0 Submission September 2001 Tim Moore, Bernard Aboba/Microsoft Feedback?