leon s. scaldeferri€¦ · presentation page 1 leon s. scaldeferri fwuf (this page intentionally...

12
March.l993 Doc: IEEE P802.ll-93/028 Leon S. Scaldeferri Office of Information Security Research l NSA, R22 9800 Savage Rd. Ft. Meade MD 20755-6000 (301) - 688 - 0293 10289 [fax] em: [email protected] 1. Opinions expressed in this paper are those of the author and do not represent the opinions or position of the FWUF or NSA. Presentation Page 1 Leon s. Scaldeferri FWUF

Upload: others

Post on 19-Jul-2020

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March.l993 Doc: IEEE P802.ll-93/028

Leon S. Scaldeferri

Office of Information Security Researchl

NSA, R22

9800 Savage Rd.

Ft. Meade MD 20755-6000

(301) - 688 - 0293 10289 [fax]

em: [email protected]

1. Opinions expressed in this paper are those of the author and do not represent the opinions or position of the FWUF or NSA.

Presentation Page 1 Leon s. Scaldeferri FWUF

Page 2: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

(This Page Intentionally Blank)

Page 3: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE P802.l1-93/028

IEEE 802.10

£tandard for

Interoperable

LAN & MAN

£ecurity

Preaen tatlon l'a&e 2 Leon 8.ScaJdel'errl FWUF

March 1993 Doc: IEEE P802.l1·93/028

IEEE 802.10 Parts

802.l0a: The SILS Model Functional description of how the SILS fits into the OSI and 802 models and how the component parts of SILS interoperate.

802.l0b: Secure Data Exchange (SDE) Describes a security protocol that can be used to protect IEEE 802 LANs & MANs.

802.l0c: Key Management (KM) Specifies a key management architecture and protocol to support all security protocols in the OSI stack, in particular, SDE.

802.10d: System Management (SM)

PreeentatJon

Specifies a key management architecture and protocol to support SILS management requirements.

PaeeJ Leon 8.ScaldeI'errl FWUF

Page 4: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE P802.11·93/028

IEEE 802.10 Status

802.10a: The SILS Model

Under revision.

802.10b: Secure Data Exchange (SDE) Approved ANSIlIEEE standard September 1992, published February 1993.

802.10c: Key Management (KM)

Under development.

802.10d: System Management (SM)

Presentation

March 1993

Presen tatlon

Work not yet begun.

Page 4

IEEE 802.10

I

L.

Leon 9.&:aIde/'erri FWUF

Doc: IEEE P802.11·93/028

Part b - Secure Data Exchange (SDE) - Clause 2

An OSI Layer 2 Security Protocol

PaaeS Leon 9.&:aIdererrl FWUF

Page 5: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993

SDE Security Services

Data Confidentiality:

Provides for multiple confidentiality algorithms. Depends on an external Key Management Service.

Connectionless Integrity:

Depends on an external Key Management Service.

Data Origin Authentication:

Only provided in conjunction with Integrity service.

Access Control:

Doc: IEEE P802.11·93/028

Only provided in conjunction with Integrity and Authentication seIVices.

Preaentation

March 1993

Preaentation

PqeCi Leon s.&:aJdeferrl FWUF

Doc: IEEE P802.11·93/028

Threats Protected Against by 802.10

Unauthorized DillclOflUl"e

M8lIquerading

Unauthorized Data Modification

Unauthorized Reeource UIII!

ISO 7498·2·1988(E) Annex A, Threats Destruction of information and/or resources

Corruption or modification of information

Theft, removal or IOI!III of information

Disclosure of information

Interruption or services

Pqe7 Leon S.ScaJdeferri FWUF

Page 6: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993

ISO = ISO 7498-2-1988, Security Services, Recommendations

Security Service / Layer 1

AUI'HENTICATION: (5.2.1)

Peer EntltyiData Ori.:ln .. ACCESS CONfROL: (5.2.2) .. CONFIDENTIALITY: (5.2.3)

Connecdon ISO

Coonecdonl""" .. Selective Field .. Traffic Flow ISO

INfEGRITY: (5.2.4)

connection with recovery .. connection without recovery .. connection less ..

ACCOUNTABILITY: (non-repudiation) (5.2.5)

Ori.:lniDelivery

1 = Depends on ext. Key Management Services,

Presentation

March 1993

OSI

LAYER

2

LAYER 1

.. 2 = Needs Integrity,

PageS

IEEE 802

802..1

2

8021

8023

8021/IS0

8021/IS0

..

..

..

.. 8021

..

Doc: IEEE P802.11-93/028

802 = 802.10b, Appendix A

3 4

ISO 180

ISO 180

ISO 180

ISO ISO

.. .. ISO ..

.. 180

ISO ISO

ISO 180

.. .. 3 = Needs Intearity & Authentication

LeoD 9.Scaldelerrl FWUF

Doc: IEEE P802..11-93/028

RELATIONSIllP to IEEE 802 REFERENCE MODEL

Presen tatlon Page 9 Leon 9.Scaldererrl FWUF

Page 7: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

Marth 1993 Doc: IEEE PSOl.ll·93/028

SDE REQUIREMENTS

The SDE Protocol is required to be transparent to existing implementations.

• Existing IEEE 802 entities shall be able to recover ilthey receive an SDE protected padet.

• SDE entities shall be able to attept non·SDE protected patkela without impairment.

• The addition of ~urity should not modify either the (N+1) or (N·1) layer implementations.

Preaeotatlon

Note: The addition of the SDE protocol may tauae certain management values such _ the fragmentation size to change, and still be ronllidered a transparent implementation.

SDE SERVICE SPECIFICATIONS

There are only two primitives that are used at the SDE boundary:

UNI1DATA.request, with parameters; Source addr, Destination addr, MAC SDU. and

UNI1DATA.inditation, with parameters; Source addr, Destination addr, MAC SDU.

Paae lO Leon 8.Scaldeferri FWUF

March 1993 Doc: IEEE PSOl.ll·93/028

SDE Primitives

Logical Link Control

SDE_~TDATA.. SDE...bATA request indication

+ + I SDE

MA-UNITDATA.

Presen tatlon Pqell

I

Leon 8.Scaldeferri FWUF

Page 8: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE PS0211-93/028

Prelentatlon

March 1993

Presentation

802.1ObSDE

MAC MAC

MAC MGMT

Media Independent Layer

PHY Convergence La~

"" Medium Dependent Layer

802.11 ARCIllTECTURE with Security

Pa&eU

SDE PDU Structure

SDE uses a single PDU type.

SDE PDU may contain up to five elements.

1. Clear Header

2. Protected Header

3. Data (SDE SDU)

4. PAD

5. Integrity Check Value (lCV)

All these elements are optional except Data.

Leon 8.ScaIdelerri FWUF

Doc: IEEE PS02.11-93/028

Protected Header, Data, and PAD may be transformed by the Integrity algorithm.

Protected Header, Data, PAD and ICV shall be transrormed when the confidentiality algorithm is applied.

Pa&e 13 Leon 8.ScaIdelerri FWUF

Page 9: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE P8Ol.ll·93/028

Structure of SDE SDU

.1 DSAP 1 SSAP 1 CONTROL 1 DATA

./ SDE SDU (e.g. LLC PDU) i .

L EnciPher~/~y include expansion and/or cryptographic .i.~.foL-J .... Lt--------I·'---- ICVed . ~.I I

Ii-!-~D-es-~g-n-a-to-r-,Ir-SAID----,--MD--F-.:,'··I '" Station ID ( Padding 1 r~ '1

3 4

Presentation

March 1993

Source Addreas

s20 8

Paae 14

Construction of the SDE PDU

s255 1

Leon 8.Scaldel'errl FWUF

Doc: IEEE P802.1l·93/028

r-------------------------------~I Sou~Adweas

Destination Addresa_--------------------------------.... I

.... loalDllMLLCPlJut

f:= ~~~""---"~.ci-1

." ... Presen taUon Paae15 Leon 8.ScaldeI'errl

FWUF

Page 10: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE P802.11·93/028

SDE Security Associations

Attribute values & A's SAID

I SYlltem and/or I --I SYlltem and/or K~MgmL ~.~ ______________ ~ ________ ~~=-~: KeyMgmL

Station A Attribute values & B's SAID Station B

Initial Exchange

Security Associations

Attributes Confid. Integ. Alg.ID AlLID MDF .... Security Asso. # 1 Y Y 1 2 8ADBC7

Security Asso. # 2 N Y 1

• •

Security Asso. # n .

SMIB.

Pr~tation Paae16 Leon S.ScaJdeferrl FWUF

March 1993 Doc: IEEE P802.11·93/028

Presentation

802.11 ISSUES Topic: Security

Open Issues

6.2 - Does the PHY layer perform or support the security function?

6.3 - How does unauthorized network access impact MAC throughput?

6.4 - How will Authentication & Registration be specified in 802.11 ?

6.6 - Is there any additional work on Security that needs to be done in 802.11 in addition to the work that is done by 802.10?

6.7 - How does re-association interact with authentication?

6.8 - How does re-association interact with Privacy?

Pqe 17 Leon S.ScaJdeferri FWUF

Page 11: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

March 1993 Doc: IEEE P802.l1-93/028

ISSUE 6.2 Does the PHY layer perform or support the security function?

In support of: NO!

Multiple PHY's, would most likely require multiple security implementations.

Application of 802.10b SDE would result in media independent solution.

802.10b is an approved standard and allows for flexibility regarding security functions, i.e. private to open system can share the same media (BSA).

802.10b would permit interoperability with other 802 LAN's employing it.

Preeeotation Paae 18

March 1993

ISSUE 6.3

Leon S.Scaldeterri FWUF

Doc: IEEEPS02.1l-93/028

How does unauthorized network access impact MAC throughput?

Comments:

802.10 Protects against the ISO 7498-2-1988 threats of;

Masquerade Replay Modification of messages

Does not Protect against all threats of;

Denial of Service, either intentional or unintentional.

e.g co-channel use, interference, lack of etiquette

Presentation pqe19 Leon S.Scalde/'errl FWUF

Page 12: Leon S. Scaldeferri€¦ · Presentation Page 1 Leon s. Scaldeferri FWUF (This Page Intentionally Blank) March 1993 Doc: IEEE P802.l1-93/028 IEEE 802.10 £tandard for Interoperable

, \

March 1993 Doc: IEEE P802.1l·93/028

ISSUE 6.4 How will Authentication & Registration be specified?

An Authentication & Registration procedure using 802.10b could be provided as an annex to 802.11. Possible implementations might use RSA, DSS, IS-54 or something else. Request submissions by interested parties on actual implementations consistent with 802.10b SDE.

ISSUE 6.6 Is there additional work on Security that needs to be done in 802.11

in addition to the work that is done by 802.10.

Believe this presentation has answered that question, NO, to majority of threats, but denial of services from Issue 6.3 still needs to be addressed, or this issue belongs somewhere else!.

Preaen lation

March 1993

Paee20

ISSUES 6.7 & 6.8

Leon 8.Scaldelerri FWUF

Doc: IEEE P802.1l-93/028

How does re-association interact with authentication & privacy?

The use of Security Associations set up in the Security Management Information Base, (SMIB) of 802.10 could provide for a way to effectively and efficiently handle re-associations for both authentication and privacy.

Preaen tatton Paee21 Leon S.Scaldelerrl FWUF