290 likes | 483 Views
Proposed new AKM for Fast Roaming. Nancy Cam-Winget, Cisco Systems Inc Doug Smith, Cisco Systems Inc Keith Amann, Spectralink. Fast Roam Goals. TGi has provided sound framework and protocols to secure 802.11 link communications Next step is to evaluate Fast Roaming
E N D
Proposed new AKM for Fast Roaming Nancy Cam-Winget, Cisco Systems Inc Doug Smith, Cisco Systems Inc Keith Amann, Spectralink N. Cam-Winget, D. Smith, K. Amann
Fast Roam Goals • TGi has provided sound framework and protocols to secure 802.11 link communications • Next step is to evaluate Fast Roaming • Voice advocates no more than 50ms handoff latency • Are security considerations for voice the same as data? • Submission focuses on fast roaming for voice • Only reassociation exchange is applied N. Cam-Winget, D. Smith, K. Amann
Handoff Times for Voice • Doc 02/758 states: • ITU guidance on TOTAL hand-off latency is that it should be less than 50 ms. Cellular networks try to keep it less than 35 ms. N. Cam-Winget, D. Smith, K. Amann
Probe Requests … Probe Response Pre-authentication Exchange Re-association Exchange 4-way & 2-way handshakes Handoff Process Delays STA APs Discovery Other APs New AP IAPP Reauthentication N. Cam-Winget, D. Smith, K. Amann
The Handoff Procedure : two phases • Discovery (active or passive scanning) • Determination to find new AP due to signal strength loss (or inability to communicate) with current AP • Probe delays incurred when client searches for new AP • Reauthentication • Station reauthenticates and reassociates to new AP • Reauthentication and reassociation delays • Implications: • Discovery phase – out of TGi’s scope • Reauthentication phase must be efficient to support wireless voice N. Cam-Winget, D. Smith, K. Amann
Average Roam latencies in current 802.11 systems N. Cam-Winget, D. Smith, K. Amann
Cryptographic computations for RSN 4-way and 2-way exchanges 1 Hmac-SHA1 used as PRF to compute WRAP or CCMP keys 2 Hmac-MD5 requires 2 MD5 operations 3 Only computed when GTK is refreshed 4 MIC check doesn’t affect data flow N. Cam-Winget, D. Smith, K. Amann
RSN Relative Costs **802.11 Open Auth + (Re)Assoc = 4 pkts N. Cam-Winget, D. Smith, K. Amann
Potential delays • Computational delay • Each authentication packet • Each packet requiring generation of PRF • Media access delay : due to packets sent by other NICs between the authentication packets Example: 1500 octet packet arrives while AP is processing an association response: • AP at 11Mbps ≈ 1.1ms delay between each packet • AP at 6Mbps ≈ 2ms delay between each packet • AP at 2Mbps ≈ 6ms delay between each packet For 10 message exchange, media access delay alone is 10-60ms! The heavier the traffic, the higher the delay…. N. Cam-Winget, D. Smith, K. Amann
Fast Roam for voice implies: • Pre-authentication is required • Re-association 4-way handshake is too expensive • Additional 2-way handshake for GTK delivery does not help. GOAL: • Hand-off times MUST be efficient to support synchronous connections, e.g. VoIP N. Cam-Winget, D. Smith, K. Amann
AP Authenticator Ideally, compress roaming to: Client Supplicant Reassociate Request: negotiate CKM, authenticate rekey Reassociate Response: validate rekey, random challenge, deliver group key Reassociate Confirm: random challenge response, MIC Client and AP can now protect 802.1X and 802.11 packets N. Cam-Winget, D. Smith, K. Amann
Handoff Procedure using a Roam Server Roam Server Send Security Block Establish Security Block 1st AP New AP Re-association • Assumptions: • Roam Server can be adapted to document 02/758 • Roam Server is trusted, can be the Authentication Server • AP is trusted and has trust relationship with Roam Server N. Cam-Winget, D. Smith, K. Amann
Roam Server is Central Key Manager (CKM) Central Key Management (CKM) Protocol: • Uses PMK from successful EAP Authentication to derive • rekey request key (RRK) – used to authenticate rekey element in reassociation request • Rekey base key (RBK) – used to mutually derive pairwise transient keys (PTK) to protect 802.1X and 802.11 packets. • RRK and RBK derived on association • RRK serves as authorization key • RBK serves as Base Key used to derive PTKs • Roam Server may only distribute PTKs or with proactive key distribution can forward <RRK,RBK> to APs N. Cam-Winget, D. Smith, K. Amann
PMK implicitly derived as a result of a successful EAP authentication Generate RRK and BRK: PRF-384(PMK, “Fast-Roam Generate Base Key”, MACAPi | MACSTA | NonceSTA | NonceRS) RBK 256 bits RRK 128 bits PTKRSC = PRF-XXX(RBK, RSC|BSSID) 802.1X Encrypt Key (16bytes) 802.11 Encrypt Key (16 bytes) MIC Keys (TKIP only) Tx Key Rx Key 8 bytes 8 bytes 802.1X MIC Key (16 bytes) New Key Hierarchy N. Cam-Winget, D. Smith, K. Amann
New Key Hierarchy facilitates reassoc • RRK used to authenticate new Reassociation Request element MIC = HMAC-MD5(RRK, MACSTA | BSSID | RSNESTA | RSC ) N. Cam-Winget, D. Smith, K. Amann
Reassociation Response includes GTK MICRRK = HMAC-MD5(RRK, RSC | MACSTA) PTKRSC = <KCK, KEK, TK> = PRF-XXX(RBKBSSID, RSC | BSSID ) MICPTK = HMAC-MD5(TKRSC, RSNEAP | RSC | KeyIDunicast | KeyIDmulticast | Multicast Key length | E(PTKRSC, GTK) ) N. Cam-Winget, D. Smith, K. Amann
Re-association Confirm • New 3rd message should be management : • 3rd message includes random challenge response • 3rd message confirms liveness of PTK • 3rd message defeats MIM attack N. Cam-Winget, D. Smith, K. Amann
Same Assoc and 802.1X Auth as default RSN Open Authentication Request Open Authentication Response Association Req + RSN IE (802.1X, CKM)** Association Response (success) EAP type specific mutual authentication Derive Pairwise Master Key (PMK) Derive Pairwise Master Key (PMK) RADIUS ACCEPT (with PMK) 802.1X/EAP-SUCCESS **New AKM → Central Key Management (CKM) is negotiated N. Cam-Winget, D. Smith, K. Amann
Initial 4-way handshake with Roam Server STA RS AP PMK PMK Derive SNonce Derive ANonce EAPoL-Key(Unicast, ANonce) Derive RRK, RBK, PTK1 EAPoL-Key(Unicast, SNonce, MIC, RSNESTA) Derive RRK, RBK, PTK1 EAPoL-Key(Install PTK1, Unicast, MIC, RSNEAP) EAPoL-Key(Unicast, MIC) Deliver PTK1 Install Keys Install Keys Group key handshake used for PTK liveness confirm N. Cam-Winget, D. Smith, K. Amann
AP Authenticator Ideally, compress roaming to: Client Supplicant Client determines new AP for roam, increments RSC Generates new PTKi, requests CKM Generate CKM rekey authentication element Reassociate Request: negotiate CKM, authenticate rekey AP validates CKM rekey authentication element Generates new PTKi, finalizes Client switch to AP Generate CKM rekey response authentication element Deliver group keys to Client Reassociate Response: validate rekey, random challenge, deliver group key Reassociate Confirm: random challenge response, MIC Client and AP can now protect 802.1X and 802.11 packets N. Cam-Winget, D. Smith, K. Amann
Using Roam Server STA RS AP Reassoc Req: negotiate CKM, authenticate rekey AP requests for STA’s RBK (For proactive key distribution, no request is needed) Deliver STA’s RBK Reassoc Resp: validate rekey, random challenge, deliver group key Reassoc Confirm: random challenge response N. Cam-Winget, D. Smith, K. Amann
Reassociation triggers rekey with new AP • Rekey obviates need to reauthenticate with AS • Rekey obviates need for client to pre-authenticate • Rekey is embedded in reassociate exchange to reduce number of packet exchanges • Reassociation messages include new authenticated element to validate rekey request N. Cam-Winget, D. Smith, K. Amann
Cryptographic computations for CKM Reassociation 1 Hmac-SHA1 used as PRF to compute CCMP keys 2 Hmac-MD5 requires 2 MD5 operations 3 Only computed when GTK is refreshed 4 Can be precomputed before reassociation commit N. Cam-Winget, D. Smith, K. Amann
Relative Costs **Presumes Pre-authentication N. Cam-Winget, D. Smith, K. Amann
Proposal optimizes Fast roaming by • Reduction in packet exchanges • Reduction in cryptographic computations • No propagation of MK or PMK is required • Roam Server can be adapted to use proactive key distribution and forward <RRK,RBK,RSC> in context N. Cam-Winget, D. Smith, K. Amann
TGi must address Fast Roaming • Roaming must be seamless for all clients • Must account for small clients (e.g. wireless phones) N. Cam-Winget, D. Smith, K. Amann
Feedback? N. Cam-Winget, D. Smith, K. Amann
Roam Server generates AP specific <RRK, RBK> Roam Server <RRKAP1, RBKAP1> <RRKAP1, RBKAP1> 1st AP New AP Re-association <RRKAP1, RBKAP1> = PRF-384(PMK, “Fast-Roam Generate Base Key”, MACAP1 | MACSTA | NonceSTA | NonceRS) N. Cam-Winget, D. Smith, K. Amann
Initial 4-way handshake in distributed model…. PMK PMK Derive SNonce Derive ANonce EAPoL-Key( Unicast, ANonce) Derive RRK, RBK, PTK1 EAPoL-Key(Unicast, SNonce, MIC, RSNESTA) Derive RRK, RBK, PTK1 EAPoL-Key( Install PTK1, Unicast, MIC, RSNEAP) EAPoL-Key(Unicast, MIC) Install Keys Install Keys N. Cam-Winget, D. Smith, K. Amann