Doc.: IEEE 802.11-01/303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom.

Slides:



Advertisements
Similar presentations
Authentication.
Advertisements

Doc.: IEEE /087 Submission May, 2000 Steven Gray, NOKIA Jyri Rinnemaa, Jouni Mikkonen Nokia Slide 1.
Encrypting Wireless Data with VPN Techniques
Doc.: IEEE /039 Submission January 2001 Haverinen/Edney, NokiaSlide 1 Use of GSM SIM Authentication in IEEE System Submitted to IEEE
External User Security Model (EUSM) for SNMPv3 draft-kaushik-snmp-external-usm-00.txt November, 2004.
PEAP & EAP-TTLS 1.EAP-TLS Drawbacks 2.PEAP 3.EAP-TTLS 4.EAP-TTLS – Full Example 5.Security Issues 6.PEAP vs. EAP-TTLS 7.Other EAP methods 8.Summary.
Internet and Intranet Protocols and Applications Lecture 9a: Secure Sockets Layer (SSL) March, 2004 Arthur Goldberg Computer Science Department New York.
SSL : An Overview Bruhadeshwar Bezawada International Institute of Information Technology, Hyderabad.
IEEE i IT443 Broadband Communications Philip MacCabe October 5, 2005
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Doc.: IEEE /275 Submission September 2000 David Halasz, Cisco Systems, Inc.Slide 1 IEEE 802.1X for IEEE David Halasz, Stuart Norman, Glen.
Eduroam – Roam In a Day Louis Twomey, HEAnet Limited HEAnet Conference th November, 2006.
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
1 © NOKIA MitM.PPT/ 6/2/2015 / Kaisa Nyberg (NRC/MNW), N.Asokan (NRC/COM) The Insecurity of Tunnelled Authentication Protocols N. ASOKAN, VALTTERI NIEMI,
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
FIT3105 Smart card based authentication and identity management Lecture 4.
DIMACS Nov 3 - 4, 2004 WIRELESS SECURITY AND ROAMING OVERVIEW DIMACS November 3-4, 2004 Workshop: Mobile and Wireless Security Workshop: Mobile and Wireless.
802.1x EAP Authentication Protocols
Protected Extensible Authentication Protocol
Wireless LAN Security Framework Backend AAA Infrastructure RADIUS, TACACS+, LDAP, Kerberos TLSLEAPTTLSPEAPMD5 VPN EAP PPP x EAP API.
Department of Computer Science Southern Illinois University Carbondale Wireless and Network Security Lecture 9: IEEE
IEEE Wireless Local Area Networks (WLAN’s).
WLAN Security:PEAP Sunanda Kandimalla. Intoduction The primary goals of any security setup for WLANs should include: 1. Access control and mutual authentication,
Master Thesis Proposal By Nirmala Bulusu Advisor – Dr. Edward Chow Implementation of Protected Extensible Protocol (PEAP) – An IEEE 802.1x wireless LAN.
WLAN security S Wireless Personal, Local, Metropolitan, and Wide Area Networks1 Contents WEP (Wired Equivalent Privacy) No key management Authentication.
EAP Overview (Extensible Authentication Protocol) Team Golmaal: Vaibhav Sharma Vineet Banga Manender Verma Lovejit Sandhu Abizar Attar.
Windows 2003 and 802.1x Secure Wireless Deployments.
Wireless security & privacy Authors: M. Borsc and H. Shinde Source: IEEE International Conference on Personal Wireless Communications 2005 (ICPWC 2005),
WIRELESS LAN SECURITY Using
Comparative studies on authentication and key exchange methods for wireless LAN Authors: Jun Lei, Xiaoming Fu, Dieter Hogrefe and Jianrong Tan Src:
Wireless and Security CSCI 5857: Encoding and Encryption.
SSL / TLS in ITDS Arun Vishwanathan 23 rd Dec 2003.
Eugene Chang EMU WG, IETF 70
Solutions for Secure and Trustworthy Authentication Ramesh Kesanupalli
Behzad Akbari Spring 2012 (These slides are based on lecture slides by Lawrie Brown)
Introduction to Secure Sockets Layer (SSL) Protocol Based on:
KAIS T Security architecture in a multi-hop mesh network Conference in France, Presented by JooBeom Yun.
Shambhu Upadhyaya Security –Upper Layer Authentication Shambhu Upadhyaya Wireless Network Security CSE 566 (Lecture 10)
XMPP Concrete Implementation Updates: 1. Why XMPP 2 »XMPP protocol provides capabilities that allows realization of the NHIN Direct. Simple – Built on.
Chapter 21 Distributed System Security Copyright © 2008.
CWSP Guide to Wireless Security Chapter 2 Wireless LAN Vulnerabilities.
WEP Protocol Weaknesses and Vulnerabilities
EAP Keying Problem Draft-aboba-pppext-key-problem-03.txt Bernard Aboba
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Network access security methods Unit objective Explain the methods of ensuring network access security Explain methods of user authentication.
Doc.: IEEE /495r1 Submission July 2001 Jon Edney, NokiaSlide 1 Ad-Hoc Group Requirements Report Group met twice - total 5 hours Group size ranged.
Doc.: IEEE /524r0 Submission November 2001 Bernard Aboba, MicrosoftSlide 1 Secure Remote Password (SRP) Bernard Aboba Dan Simon Tim Moore Microsoft.
Doc.: IEEE /xxxr0 Submission November, 2004 Jim TomcikSlide 1 cdma2000-WLAN Interworking Jim Tomcik Raymond Hsu
Doc.: IEEE /213r0 Submission March 2002 D Jablon/Phoenix and Alternative Authentication Protocols David Jablon Phoenix Technologies.
Lecture 24 Wireless Network Security
EAP-FAST Version 2 draft-zhou-emu-eap-fastv2-00.txt Hao Zhou Nancy Cam-Winget Joseph Salowey Stephen Hanna March 2011.
EAP Keying Framework Draft-aboba-pppext-key-problem-06.txt EAP WG IETF 56 San Francisco, CA Bernard Aboba.
ICOS BOF EAP Applicability Bernard Aboba IETF 62, Minneapolis, MN.
SMUCSE 5349/7349 SSL/TLS. SMUCSE 5349/7349 Layers of Security.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
Doc.: IEEE /0315r4 Submission July 2009 Dan Harkins, Aruba NetworksSlide 1 Enhanced Security Date: Authors:
Wireless security Wi–Fi (802.11) Security
Emu wg, IETF 70 Steve Hanna, EAP-TTLS draft-funk-eap-ttls-v0-02.txt draft-hanna-eap-ttls-agility-00.txt emu wg, IETF 70 Steve Hanna,
Encryption protocols Monil Adhikari. What is SSL / TLS? Transport Layer Security protocol, ver 1.0 De facto standard for Internet security “The primary.
Wireless Network Security CSIS 5857: Encoding and Encryption.
Channel Binding Support for EAP Methods Charles Clancy, Katrin Hoeper.
Secure Socket Layer SSL and TLS. SSL Protocol Peer negotiation for algorithm support Public key encryptionPublic key encryption -based key exchange and.
Doc.: IEEE /610r0 Submission November 2001 Tim Moore, Microsoft 802.1X and key interactions Tim Moore.
KAIS T Comparative studies on authentication and key exchange methods for wireless LAN Jun Lei, Xiaoming Fu, Dieter Hogrefe, Jianrong Tan Computers.
Doc.: IEEE /403r0 Submission July 2001 Albert Young, 3Com, et alSlide 1 Supplementary Functional Requirements for Tgi ESS Networks Submitted to.
Lecture 6 (Chapter 16,17,18) Network and Internet Security Prepared by Dr. Lamiaa M. Elshenawy 1.
Cryptography CSS 329 Lecture 13:SSL.
Wireless Protocols WEP, WPA & WPA2.
Secure Sockets Layer (SSL)
Presentation transcript:

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 1 EAP-TLS Alternative for Security Simon Blake-Wilson Certicom

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 2 Motivation Concerns over passive dictionary attacks on Kerberos Investigate TLS as alternative to Kerberos or in addition to Kerberos Please forgive me and AAA ignorance … I’m a cryptographer!

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 3 Outline Requirements View from 10,000 Feet Operational Scenarios A Peek at the Details Dependencies Pros and Cons Summary

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 4 Requirements Efficiency Small code size (<X kB where x=?) Efficient initial authentication (<Y secs where Y=?) Efficient roaming (<Z secs where Z=200ms?) Clients cannot be assumed to have “high entropy” secrets Security As much or better than existing wired LANs Mutual entity authentication of client and network Secure session key establishment Secure negotiation of encryption algorithms and key sizes Minimize use of new techniques

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 5 View from 10,000 Feet Re-uses 802.1X and Enhanced Data Encryption “Realms” consisting of APs and optionally RADIUS server(s)

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 6 View from 10,000 Feet 2 Solution steps: Server-authenticated or anonymous TLS-EAP performed between client and serving realm RADIUS server (if present) or AP Encryption keys derived from master secret and MAC addresses Encryption turned on after TLS handshake Traditional client authentication performed using EAP over encrypted channel 802.1X controlled ports opened after successful client authentication Optional enhancement - client TLS certificates - can be terminated at serving realm RADIUS server

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 7 Scenarios - Enterprise & Public Access Serving system has RADIUS server with certificate Serving system authenticated using certificate during TLS handshake Serving system readable name confirmed with user Client authenticated based on e.g. existing username and password using EAP after TLS over encrypted channel - serving system authenticates client by contacting home system RADIUS server Effectively reduces problem to known client authentication problem

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 8 Scenarios - Enterprise & Public Access 2 Achieving efficient roaming - option A: Client “TMSI” derived from master key along with encryption keys Serving RADIUS server passes TMSI and encryption keys to adjacent APs - can be done in advance Client passes TMSI to new AP as initial EAP identity If AP recognizes TMSI, controlled port opened immediately - otherwise TLS handshake and client authentication performed Achieving efficient roaming - option B - via TLS session resume Achieving efficient roaming - option C - DIAMETER Achieving efficient roaming - option D - context transfer

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 9 Scenarios - SOHO AP and client establish shared password in advance Anonymous TLS handshake performed Client and AP mutually authenticate based on password using password after TLS handshake over encrypted channel (This prevents only passive dictionary attacks.)

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 10 A Peek at the Details EAP identity response may be empty, may identify desire to perform TLS or negotiate another option, may identify home system, or may contain TMSI Derivation of encryption keys from master secret ensures encryption keys unique to particular client-AP session Clients must support one server-authenticated TLS cipher suite and one anonymous cipher suite APs must support EAP-passthrough to RADIUS server or one anonymous cipher suite TLS already supports encryption algorithm and key size negotiation Advanced cipher suites may be supported - ECC (efficient), Kerberos (existing password-based option within TLS), or SRP (improved password-based option being standardized) May alternatively add password exchange option to EAP-TLS

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 11 Dependencies Fundamental dependencies are all complete or near complete: 802.1X EAP EAP over TLS TLS Options still in draft or need to be written: ECC, SRP in TLS DIAMETER EAP-TLS extension TLS extensions What else?

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 12 Pros Not susceptible to passive and optionally active dictionary attacks by RF eavesdropper Improved security for efficient roaming TLS over EAP more direct approach - therefore easier to analyze and code TLS over EAP more flexible approach - built in secure cipher suite negotiation TLS already widely implemented on clients and included in some RADIUS servers More direct re-use of established RADIUS usernames and passwords Supports possible addition of anonymity option Roaming solution offers improved security Under consideration within Bluetooth SIG SEG

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 13 Cons Public-key cryptography required in clients and SOHO APs Certificates required in RADIUS servers providing public access Clients need root keys Sensible decisions about certificate issuing and processing required - do service providers need to run a CA? Revocation? Feasability of roaming?

doc.: IEEE /303 Submission May 2001 Simon Blake-Wilson, CerticomSlide 14 Summary Dictionary attacks on Kerberos (even v5) worry me Efficient roaming with Kerberos also has some undesirable security features EAP-TLS appears attractive as the mandatory improved authentication mechanism EAP-TLS could alternatively be described as optional alternative to Kerberos What am I missing?