130 likes | 240 Views
July 2011. Security Discussions. Date: 2011-09-22. Authors:. Slide 1. Robert Moskowitz, Verizon. July 2011. Abstract. This document covers a number of security thoughts that 802.11ai may leverage to meet their performance and security goals. One size does NOT fit all
E N D
July 2011 Security Discussions Date: 2011-09-22 Authors: Slide 1 Robert Moskowitz, Verizon
July 2011 Abstract This document covers a number of security thoughts that 802.11ai may leverage to meet their performance and security goals. • One size does NOT fit all • “Trust then Verify” • Cryptographically bound MAC addresses Slide 2 Robert Moskowitz, Verizon
July 2011 Agenda • How to offer choices • Trust then Verify of X.509 identities • Raw public keys as identities • Cryptographically bound MAC addresses • Conclusions Slide 3 Robert Moskowitz, Verizon
July 2011 Problem Statement • How can 11ai make speed assertions if parts of the timings are deployment dependent • AAA and DHCP servers • Some use cases can allow for 'fast enough'? • How to affectively offer security choices? • What is the cost in identities • Code and CPU to process • Network activity to trade and trust Slide 4 Robert Moskowitz, Verizon
July 2011 Approaches to offering Security choices • Use of the EAP model places authentication and keying choices within the EAP wrappings • Is this really simpler? • What are the costs? • Consider Beacon or Auth based offers • AP lists what it can provide • STA lists what it wants to provide • Who is on first? STA or AP? • Either works Slide 5 Robert Moskowitz, Verizon
July 2011 Approaches to offering Security choices • AP Beacons Authentication methods • In Beacons • STA Probes for desired Authentication method • In Beacon Probe • Or STA Requests a method from a offered list • In Auth Request Slide 6 Robert Moskowitz, Verizon
July 2011 X.509 based “Trust then Verify” • X.509 certificate verification MAY take network resources • OCSP and online CRL lookup • STA accepts AP cert until it can verify • Local policy decision • May occur after IP connectivity or be delayed after 'time critical' E2E secured activity • AP accepts STA cert until it can verify • STA immediately has IP connectivity • Small time window for STA activity until verified Slide 7 Robert Moskowitz, Verizon
July 2011 X.509 based “Trust then Verify” • Risk is 'window of opportunity' • STA may only want the station/area map while verifying AP • AP may restrict STA services until verified to local resources (maps!) • Built on STA-AP KMP model supporting certs • e.g. IKEv2 or HIP-BEX • Some cert providers are gearing up for easy, affordable large scale cert deployment Slide 8 Robert Moskowitz, Verizon
July 2011 Solution Overview • Providing an authenticated client model • AP does need to know 'who' the client is • Client presents credentials to AP • X.509 cert validated by AP or via OCSP • No AS needed by AP (well maybe OCSP) • Limited choices that are 'fast' • Client validates AP via X.509 or raw Public Key 'white list'. No AS needed by client. • May be hard to provide 'fast' solution or 'not so fast' Slide 9 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • A Public/Private key operation is an assertion of identity • Self-signed certs as an identity claim • '“I am”, I said' – Neil Diamond, 1971 • What is gained by self-signed certs over raw keys? • Binding protection from MITM? Really? • If STA really needs to trust AP then 3rd party certs a must. Otherwise go with raw public keys • Raw public keys CAN make other identity assertions • Cryptographically Bound Addresses • e.g. HIP HITs Slide 10 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • Consider Cryptographically generated MAC addresses • Manufacturer hashes a public key with its 24 bit MAC header to produce 24 bit lower part of MAC • If a collision with prior assigned MAC, generate a new key pair, and repeat • If manufacture produces 500K devices, attacker has 3% chance to spoof SOME valid MAC for each key pair generation • 500K/16M • But 1/16M for a specific MAC • Hardness of spoofing proportional to devices manufactured Slide 11 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • Consider Cryptographically generated MAC addresses • More natural trust in MAC without PKI overhead • Manufacturer MAY publish assigned MACs for actual validation • What mechanism? • Many applications of CGA MACs Slide 12 Robert Moskowitz, Verizon
May 2011 Conclusions • There is a role for “Trust then Verify” for fast access • In many scenarios use of raw keys will result in MORE security being used • “Any one can do it” Thank you! Slide 13 Robert Moskowitz, Verizon