130 likes | 246 Vues
This document discusses security strategies for 802.11ai, focusing on achieving performance goals while ensuring robust security measures. Key concepts include the importance of tailored security approaches, the "trust then verify" principle using X.509 identities, and cryptographically bound MAC addresses. The document explores offering security choices through authentication models, assessing the trade-offs between speed and security, and highlights self-assertion of identity using public/private key operations and self-signed certificates. It advocates for the effective management of identities to enhance network safety.
E N D
July 2011 Security Discussions Date: 2011-09-22 Authors: Slide 1 Robert Moskowitz, Verizon
July 2011 Abstract This document covers a number of security thoughts that 802.11ai may leverage to meet their performance and security goals. • One size does NOT fit all • “Trust then Verify” • Cryptographically bound MAC addresses Slide 2 Robert Moskowitz, Verizon
July 2011 Agenda • How to offer choices • Trust then Verify of X.509 identities • Raw public keys as identities • Cryptographically bound MAC addresses • Conclusions Slide 3 Robert Moskowitz, Verizon
July 2011 Problem Statement • How can 11ai make speed assertions if parts of the timings are deployment dependent • AAA and DHCP servers • Some use cases can allow for 'fast enough'? • How to affectively offer security choices? • What is the cost in identities • Code and CPU to process • Network activity to trade and trust Slide 4 Robert Moskowitz, Verizon
July 2011 Approaches to offering Security choices • Use of the EAP model places authentication and keying choices within the EAP wrappings • Is this really simpler? • What are the costs? • Consider Beacon or Auth based offers • AP lists what it can provide • STA lists what it wants to provide • Who is on first? STA or AP? • Either works Slide 5 Robert Moskowitz, Verizon
July 2011 Approaches to offering Security choices • AP Beacons Authentication methods • In Beacons • STA Probes for desired Authentication method • In Beacon Probe • Or STA Requests a method from a offered list • In Auth Request Slide 6 Robert Moskowitz, Verizon
July 2011 X.509 based “Trust then Verify” • X.509 certificate verification MAY take network resources • OCSP and online CRL lookup • STA accepts AP cert until it can verify • Local policy decision • May occur after IP connectivity or be delayed after 'time critical' E2E secured activity • AP accepts STA cert until it can verify • STA immediately has IP connectivity • Small time window for STA activity until verified Slide 7 Robert Moskowitz, Verizon
July 2011 X.509 based “Trust then Verify” • Risk is 'window of opportunity' • STA may only want the station/area map while verifying AP • AP may restrict STA services until verified to local resources (maps!) • Built on STA-AP KMP model supporting certs • e.g. IKEv2 or HIP-BEX • Some cert providers are gearing up for easy, affordable large scale cert deployment Slide 8 Robert Moskowitz, Verizon
July 2011 Solution Overview • Providing an authenticated client model • AP does need to know 'who' the client is • Client presents credentials to AP • X.509 cert validated by AP or via OCSP • No AS needed by AP (well maybe OCSP) • Limited choices that are 'fast' • Client validates AP via X.509 or raw Public Key 'white list'. No AS needed by client. • May be hard to provide 'fast' solution or 'not so fast' Slide 9 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • A Public/Private key operation is an assertion of identity • Self-signed certs as an identity claim • '“I am”, I said' – Neil Diamond, 1971 • What is gained by self-signed certs over raw keys? • Binding protection from MITM? Really? • If STA really needs to trust AP then 3rd party certs a must. Otherwise go with raw public keys • Raw public keys CAN make other identity assertions • Cryptographically Bound Addresses • e.g. HIP HITs Slide 10 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • Consider Cryptographically generated MAC addresses • Manufacturer hashes a public key with its 24 bit MAC header to produce 24 bit lower part of MAC • If a collision with prior assigned MAC, generate a new key pair, and repeat • If manufacture produces 500K devices, attacker has 3% chance to spoof SOME valid MAC for each key pair generation • 500K/16M • But 1/16M for a specific MAC • Hardness of spoofing proportional to devices manufactured Slide 11 Robert Moskowitz, Verizon
July 2011 Self Assertion of Identity • Consider Cryptographically generated MAC addresses • More natural trust in MAC without PKI overhead • Manufacturer MAY publish assigned MACs for actual validation • What mechanism? • Many applications of CGA MACs Slide 12 Robert Moskowitz, Verizon
May 2011 Conclusions • There is a role for “Trust then Verify” for fast access • In many scenarios use of raw keys will result in MORE security being used • “Any one can do it” Thank you! Slide 13 Robert Moskowitz, Verizon