IEEE e Security Review

Similar documents
Round Trip Delay Optimization

IEEE Broadband Wireless Access Working Group <

[Mobility Management for Mobile Multi-hop Relay Networks]

IEEE C802.16e-04/67r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-03/71r2. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/196r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-06/063r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/192r1. IEEE Broadband Wireless Access Working Group <

message reported by SSs and share DB updating for ND

IEEE C802.16i-06/014r3

IEEE C802.16e-04/151r3 Project. IEEE Broadband Wireless Access Working Group <

IEEE C802.16maint-06/055. IEEE Broadband Wireless Access Working Group <

corrected PDF IEEE C802.16g-06/011r2

IEEE Broadband Wireless Access Working Group < Fixing mappings between primitive functions and NCMS services

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < IEEE Working Group Letter Ballot #24, on P802.

IEEE C802.16d-03/45. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

Message definition to support MS network entry in centralized allocation model

Data Integrity in MAC IEEE Presentation Submission Template (Rev. 8)

IEEE Broadband Wireless Access Working Group < The document contains ARQ Proposal for /4 MAC

IEEE Broadband Wireless Access Working Group <

IEEE Presentation Submission Template (Rev. 8.3)

IEEE C802.16e-04/195r1. IEEE Broadband Wireless Access Working Group <

Nokia Fax:

IEEE C802.16e-04/446r2. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < WirelessMAN coexistence function primitives consolidation

IEEE Broadband Wireless Access Working Group < To prevent the loss of the PDUs at the serving BS during MAC hand-over.

Simulating coexistence between y and h systems in the 3.65 GHz band An amendment for e

Architecture clarification and Coexistence Protocol Chi-Chen Lee, Hung-Lin Chou Computer & Communications Research Labs, ITRI, Taiwan

IEEE Broadband Wireless Access Working Group < MSS s buffer capability negotiation for DL H-ARQ operation

IEEE C802.16j-07/209r3. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Corrections for the 3 Way SA-TEK Exchange

IEEE C802.16d-04/34. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Handoff SDL charts proposal

IEEE Broadband Wireless Access Working Group < Procedures for inter-system communication over the air

IEEE Broadband Wireless Access Working Group < Enhancement of the MBRA for Adaptation to the PKMv2

IEEE C802.16e-04/472. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < MIB II Integration and MIB II Table

A response to a Call for Technical Proposal, 06_027.pdf

IEEE Broadband Wireless Access Working Group < MBRA (Multicast & Broadcast Rekeying Algorithm) for PKMv2

IEEE C802.16h-07/043r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < message reported by SSs and share DB updating for neighbor discovery

IEEE C802.16a-02/14

MMR Network distributed tunnel connection management

IEEE C802.16maint-05/091. IEEE Broadband Wireless Access Working Group <

A General Frame Structure for IEEE802.16j Relaying Transmission

IEEE Broadband Wireless Access Working Group < Early transmission of higher layer packets in the idle mode

IEEE Broadband Wireless Access Working Group < Changes in Definition of Data Delivery Services

IEEE Broadband Wireless Access Working Group < Fix for Sleep Mode Add/Remove CIDs from Power Saving Class ID

IEEE Broadband Wireless Access Working Group < Fix broken message flow in HO decision & initiation

MMR Network centralized tunnel connection management

Data Submitted Voice: Fax: SungCheol Chang Chulsik Yoon,

IEEE C802.16maint-05/091r1. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security. Voice: Seokheon Cho

IEEE C802.16h-06/114r3. IEEE Broadband Wireless Access Working Group <

Relay Support for Distributed Scheduling and its Bandwidth Request/Allocation Mechanism

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

To reply to the call for comments on technical requirements regarding Cross-Communications

IEEE C802.16a-02/86. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < HO consideration in PKMv2 security

IEEE Broadband Wireless Access Working Group < Proposal for MAC protocol modification for

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Privacy key management for BSs and BSISs in LE Systems

IEEE C802.16e-04/201. Project. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE /15. IEEE Broadband Wireless Access Working Group < Title Interpretation of IEEE Standard 802.

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

Evaluation Procedure for MAC Protocols

Sleep Mode and Idle Mode Operations for IEEE j

IEEE abc-01/19. IEEE Broadband Wireless Access Working Group <

IEEE c-00/11. IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-318. IEEE Broadband Wireless Access Working Group <

Page 1 of 1 16-Jan-01

IEEE802.16maint-04/71r3

MMR network data forwarding and QoS schema

IEEE C802.16e-05/401r3

IEEE abc-01/18r1. IEEE Broadband Wireless Access Working Group <

IEEE C802.16h-07/017. IEEE Broadband Wireless Access Working Group <

IEEE C802.16e-05/401r2

IEEE Broadband Wireless Access Working Group <

IEEE Broadband Wireless Access Working Group < Increasing Link Robustness in TG3 Systems

IEEE C802.16h-05/021r2

IEEE Broadband Wireless Access Working Group < Detailed ARQ Proposal for a and b MAC

IEEE C802.16j- 07/309. IEEE Broadband Wireless Access Working Group <

Request for Comments: 4016 Category: Informational March 2005

IEEE White Space Radio Potential Use Cases For TVWS

IEEE C802.16e-05/242r1. IEEE Broadband Wireless Access Working Group <

Security Enhancements

IEEE Broadband Wireless Access Working Group <

Andrea Bacciccola Nokia

IEEE P WG Information Model

IEEE C /08

IEEE C802.16e-04/10. IEEE Broadband Wireless Access Working Group <

IEEE C /26. IEEE Working Group on Mobile Broadband Wireless Access <

A distributed spectrum monitoring system Authors:

Initial PHY Layer System Proposal for Sub 11 GHz BWA

Transcription:

IEEE 802.16e Security Review IEEE 802.16 Presentation Submission Template (Rev. 8.3) Document Number: [IEEE S802.16e-05/373, for example. The document number will match that of the base contribution, with S replacing C.] Date Submitted: [2005-07-18] Source: [Bernard Aboba] Voice: [425-706-6605] [Microsoft] Fax: [425-936-7936] [One Microsoft Way] E-mail: [bernarda@microsoft.com] [Redmond, WA] Venue: [IEEE 802 Plenary, San Francisco, CA] Base Document: [If this presentation accompanies an 802.16 document, cite the document number (e.g., IEEE C802.16x-02/NNr0) and URL <http://ieee802.org/16/ C80216x-02_NNr0.pdf>.] Purpose: [Summary of the IEEE 802.16eD8 Security Review] Notice: This document has been prepared to assist IEEE 802.16. It is offered as a basis for discussion and is not binding on the contributing individual(s) or organization(s). The material in this document is subject to change in form and content after further study. The contributor(s) reserve(s) the right to add, amend or withdraw material contained herein. Release: The contributor grants a free, irrevocable license to the IEEE to incorporate material contained in this contribution, and any modifications thereof, in the creation of an IEEE Standards publication; to copyright in the IEEE s name any IEEE Standards publication even though it may include portions of this contribution; and at the IEEE s sole discretion to permit others to reproduce in whole or in part the resulting IEEE Standards publication. The contributor also acknowledges and accepts that this contribution may be made public by IEEE 802.16. IEEE 802.16 Patent Policy: The contributor is familiar with the IEEE 802.16 Patent Policy and Procedures <http://ieee802.org/16/ipr/patents/policy.html>, including the statement "IEEE standards may include the known use of patent(s), including patent applications, provided the IEEE receives assurance from the patent holder or applicant with respect to patents essential for compliance with both mandatory and optional portions of the standard." Early disclosure to the Working Group of patent information that might be relevant to the standard is essential to reduce the possibility for delays in the development process and increase the likelihood that the draft publication will be approved for publication. Please notify the Chair <mailto:chair@wirelessman.org> as early as possible, in written or electronic form, if patented technology (or technology under patent application) might be incorporated into a draft standard being developed within the IEEE 802.16 Working Group. The Chair will disclose this notification via the IEEE 802.16 web site <http://ieee802.org/16/ipr/patents/notices>.

IEEE 802.16e Security Review Jeff Mandin, Streetwaves Networks Yoshihiro Ohba, Toshiba Bernard Aboba, Microsoft IEEE 802.16e Monday, July 18, 2005 http://www.drizzle.com/~aboba/eap/review.txt

IEEE 802.16e Security Review May 5, 2005: Liaison request sent by Roger Marks, Chair of IEEE 802.16 to IETF EAP and MSEC WGs Participants Jeff Mandin, IEEE 802.16 liaison to IETF Jari Arkko, Co-Chair, EAP WG Yoshihiro Ohba Gabriel Montenegro Bernard Aboba, IETF liaison to IEEE 802 Team from Stanford University Prof. John C. Mitchell Anupam Datta Changhua He Arnab Roy Mukund Sundararajan June 6, 2005: Review made public http://www.drizzle.com/~aboba/eap/review.txt http://www.drizzle.com/~aboba/eap/802.16enotes.pdf

Review Format Focus: EAP only mode Components EAP compatibility review: RFC 3748, Section 3.1 AAA Key Management requirements review: RFC 4017 http://www.ietf.org/internet-drafts/draft-housley-aaa-key-mgmt-00.txt EAP Key Management Framework review http://www.ietf.org/internet-drafts/draft-ietf-eap-keying-07.txt Formal security analysis http://www.drizzle.com/~aboba/eap/802.16enotes.pdf

Issues Critical Lack of EAP method requirements Man-in-the-middle vulnerability in Authenticated EAP mode Important Integration with the EAP state machine AAA integration Use of HMAC/CMAC TLV to protect EAP re-authentication Secure confirmation of security relevant parameters Key Context Key Installation and Deletion IPv6 compatibility

EAP Method Requirements IEEE 802.16e D8 did not specify a mandatoryto-implement EAP method Enables use of MD5-Challenge which does not generate keys and is vulnerable to offline dictionary attack. Suggestion At a minimum, IEEE 802.16e should specify the security requirements of methods to be used with it. RFC 4017 is an example of this.

MiTM Vulnerability Compound authentication mechanisms are vulnerable to manin-the-middle attacks unless cryptographic binding is used to prove participation in each authentication. http://www.saunalahti.fi/~asokan/research/tunnel.pdf http://www.ietf.org/proceedings/02nov/slides/eap-4/eap-4.ppt IEEE 802.16e D8 does not violate RFC 3748 Section 2.1 (prohibition on sequences of EAP methods) In RFC 3748, a sequence is a series of EAP authentication mechanisms without intervening EAP Success/Failure

Integration with EAP State Machine The EAP state machine defines interface variables that are exchanged between lower-layer and EAPlayer (peer and authenticator). IEEE 802.16e D8 does not describe how these variables interact with the 802.16e state machine. http://www.ietf.org/internet-drafts/draft-ietf-eap-statemachine-06.pdf What is the problem? Lack of integration between IEEE 802.1X and EAP state machines resulted in vulnerabilities in IEEE 802.1X-2001 For details, see:http://www.cs.umd.edu/~waa/1x.pdf Vulnerabilities fixed in IEEE 802.1X-2004 by integrating IEEE 802.1X and EAP state machines

AAA Integration IEEE 802.16e has no equivalent of RFC 3580, IEEE 802.1X RADIUS Usage Guidelines Are existing AAA attributes sufficient, or are additional attributes needed? Suggestion IETF RADEXT WG developing additional attributes for WLAN, IEEE 802 IEEE 802.16e can send a liaison request to IETF RADEXT WG describing additional attributes, if needed

Protection of EAP Re-Authentication Vulnerabilities Initial EAP messages (Request/Response-Identity) sent in the clear Common EAP methods treat a MIC failure as a fatal error (e.g. all methods based on TLS) Result: potential for DoS attacks Suggestion Require HMAC/CMAC TLV for carrying EAP reauthentication messages

Secure Confirmation IEEE 802.16e D8 securely confirms the selection of the best ciphersuite IEEE 802.16e D8 does not securely confirm other parameters such as the MAC algorithm or replay window size What can go wrong? MAC algorithm can be compromised, leading to a downgrade attack Replay window size can be manipulated by an attacker leading to a DoS

Key Context Definition Key context determines who is authorized to use the key, for what purpose and for how long. Without context binding, key misuse cannot be prevented or even detected. From draft-housley-aaa-key-mgmt: "Keying material MUST be bound to the appropriate context including the scope of key usage and the key lifetime the protocol MUST ensure that all parties... have the same context for the keying material. This requires that the parties are properly identified and authenticated, so that the key scope can be determined."

Key Context Issues No PMK lifetime negotiation between the MS and BS. Long default lifetimes do not solve the problem since the BS may reclaim resources. Undefined PMK scope and cache structure. The peer and authenticator may not be identified by their MAC addresses. Cache entries may include more than just keying material (e.g. authorizations). Lack of support for Channel Bindings RFC 3748, Section 7.15

Key Installation, Deletion and Naming 3-way handshake is not replay protected in one of the HMAC variants BS can hold more than one PMK for a given MS Example: EAP re-authentication. Does installation of a new PMK automatically destroy a previous PMK? When is PMK context destroyed? On failure of the 3-way handshake? On failure of EAP authentication? AK directly derived from the PMK Yet discard of the AK context may not result in discard of the PMK context. D7 reference to the Session-ID removed in D8

IPv6 IEEE 802.16e D8 Section 6.3.9.10 IPv6 Stateless Address AutoConfiguration handled via REG_RSP TLV rather than Router Advertisement Mobile IPv6 reference should be updated to RFC 3775 Confusion between CoA and dynamic HoA assignment

Feedback?