IP Mobility: IP Mobility: Threat Models and Security Requirements - - PowerPoint PPT Presentation

ip mobility ip mobility
SMART_READER_LITE
LIVE PREVIEW

IP Mobility: IP Mobility: Threat Models and Security Requirements - - PowerPoint PPT Presentation

IP Mobility: IP Mobility: Threat Models and Security Requirements Threat Models and Security Requirements Vidya Narayanan (vidyan@qualcomm.com vidyan@qualcomm.com) ) Vidya Narayanan ( Lakshminath Dondeti (ldondeti@qualcomm.com


slide-1
SLIDE 1

IP Mobility: IP Mobility:

Threat Models and Security Requirements Threat Models and Security Requirements

Vidya Narayanan ( Vidya Narayanan (vidyan@qualcomm.com vidyan@qualcomm.com) ) Lakshminath Dondeti ( Lakshminath Dondeti (ldondeti@qualcomm.com ldondeti@qualcomm.com) )

slide-2
SLIDE 2

IETF IETF-

  • 67 INT Area

67 INT Area 2 2

Outline Outline

Introduction and Goals Introduction and Goals Typical network architecture Typical network architecture Assets Assets Internet Threat Model Internet Threat Model – – A Recap A Recap Routing and IP Mobility Routing and IP Mobility Security analysis of IP mobility protocols Security analysis of IP mobility protocols Security Requirements Security Requirements Security Models Security Models

slide-3
SLIDE 3

IETF IETF-

  • 67 INT Area

67 INT Area 3 3

Introduction and Goals Introduction and Goals

IP Mobility handles changes to the IP point of presence IP Mobility handles changes to the IP point of presence (PoP) (PoP)

– – Forwards packets meant for an Forwards packets meant for an “ “anchor anchor” ” IP address to a IP address to a “ “transient transient” ” IP address IP address – – Several models (global, local, host Several models (global, local, host-

  • based, network

based, network-

  • based)

based)

Aid analysis of threat models for IP mobility protocols Aid analysis of threat models for IP mobility protocols Remove the guesswork in threats Remove the guesswork in threats Provide high level security requirements for IP mobility Provide high level security requirements for IP mobility protocols protocols Allow evaluation of a security solution Allow evaluation of a security solution

slide-4
SLIDE 4

IETF IETF-

  • 67 INT Area

67 INT Area 4 4

Overall Mobility Architecture Overall Mobility Architecture

L2 PoP1 L2 PoP2 L2 PoP3 L2 PoP4 AR AR Internet Home Network AAAL MA AAAH MN Local Network MA

L3 Mobility Management Entity L2 Mobility Management Entity Security Infrastructure Entity

CN1 CN2 CN3

Correspondent Entity

CA CA

slide-5
SLIDE 5

IETF IETF-

  • 67 INT Area

67 INT Area 5 5

Definitions Definitions

Mobility Agent Mobility Agent

– – Entity maintaining state on location of mobile nodes Entity maintaining state on location of mobile nodes

E.g., MIP HA, FMIP pAR, HMIP MAP, NETLMM LMA, MIP RO E.g., MIP HA, FMIP pAR, HMIP MAP, NETLMM LMA, MIP RO-

  • enabled CN

enabled CN

Mobility Facilitators Mobility Facilitators

– – Other entities that facilitate IP mobility Other entities that facilitate IP mobility

E.g., NETLMM MAG, MIP4 FA, HMIP AR E.g., NETLMM MAG, MIP4 FA, HMIP AR

– – It is plausible for these to fail/be compromised without denial It is plausible for these to fail/be compromised without denial of service

  • f service

Mobility Provider Mobility Provider

– – Mobility Agent or Mobility Facilitator Mobility Agent or Mobility Facilitator

Mobility Recipient Mobility Recipient

– – Entity receiving the IP mobility service Entity receiving the IP mobility service – – Mobile node is the recipient Mobile node is the recipient

slide-6
SLIDE 6

IETF IETF-

  • 67 INT Area

67 INT Area 6 6

Assets Assets

Critical Assets Critical Assets

– – Failure/compromise of these assets leads to failed mobility sess Failure/compromise of these assets leads to failed mobility sessions ions

Mobile Node Mobile Node Mobility Agent Mobility Agent Security Infrastructure Entities Security Infrastructure Entities

Non Non-

  • critical Assets

critical Assets

– – The mobility session can continue despite failure/compromise of The mobility session can continue despite failure/compromise of these these assets assets

Network infrastructure, including links Network infrastructure, including links Mobility facilitators (e.g., ARs, routers) Mobility facilitators (e.g., ARs, routers)

Other Assets Other Assets

– – Correspondent Nodes Correspondent Nodes – – Other nodes (mobile or fixed) attaching to the mobility domain Other nodes (mobile or fixed) attaching to the mobility domain

Not all assets are applicable for all mobility models Not all assets are applicable for all mobility models

slide-7
SLIDE 7

IETF IETF-

  • 67 INT Area

67 INT Area 7 7

The Internet Threat Model The Internet Threat Model – – A Recap A Recap

Assumption 1: Critical assets are not compromised Assumption 1: Critical assets are not compromised Assumption 2: The attacker has full control of the communication Assumption 2: The attacker has full control of the communication channel channel

– – Attacker can read, inject, remove, modify any packets without de Attacker can read, inject, remove, modify any packets without detection tection

Types of attacks Types of attacks

– – Passive attacks Passive attacks – – Active attacks Active attacks – – Off Off-

  • path Attacks

path Attacks – – On On-

  • path Attacks

path Attacks

Superset of Off Superset of Off-

  • path attacks

path attacks

Reference: RFC3552 Reference: RFC3552 Are all these assumptions and/or attacks applicable to IP mobili Are all these assumptions and/or attacks applicable to IP mobility ty protocols? protocols? Are there other assumptions and/or attacks that are applicable t Are there other assumptions and/or attacks that are applicable to IP

  • IP

mobility protocols? mobility protocols?

slide-8
SLIDE 8

IETF IETF-

  • 67 INT Area

67 INT Area 8 8

Routing and Byzantine Failures Routing and Byzantine Failures

A network can function in the presence of Byzantine failures A network can function in the presence of Byzantine failures

– – Entities lying about routing or other information selectively, w Entities lying about routing or other information selectively, while hile appearing to function correctly (due to compromise, appearing to function correctly (due to compromise, mis mis-

  • configuration)

configuration)

As long as there is a non As long as there is a non-

  • faulty path between nodes A and B, they

faulty path between nodes A and B, they can communicate can communicate

– – Even if the adversary sends bogus and disparate information to Even if the adversary sends bogus and disparate information to legitimate infrastructure entities, e.g., routers legitimate infrastructure entities, e.g., routers A B

slide-9
SLIDE 9

IETF IETF-

  • 67 INT Area

67 INT Area 9 9

Mobility and Failure of Non Mobility and Failure of Non-

  • critical Nodes

critical Nodes

Mobility signaling is possible even if one a few non Mobility signaling is possible even if one a few non-

  • critical assets fail

critical assets fail in an adversarial fashion in an adversarial fashion Mobility facilitators may fail in a Byzantine fashion, yet MNs c Mobility facilitators may fail in a Byzantine fashion, yet MNs can and an and should be able to get service should be able to get service

MN MA

AR AR

MN C

slide-10
SLIDE 10

IETF IETF-

  • 67 INT Area

67 INT Area 10 10

Don Don’ ’t Mess With Routing! t Mess With Routing!

A protocol among a given set of entities must not A protocol among a given set of entities must not impact routing for unrelated entities impact routing for unrelated entities

– – D D’ ’s malicious use of a protocol between C and D MUST not s malicious use of a protocol between C and D MUST not impact communication between A and B impact communication between A and B

A B C D

slide-11
SLIDE 11

IETF IETF-

  • 67 INT Area

67 INT Area 11 11

Outline Outline

Introduction and Goals Introduction and Goals Introduction and Goals Defining IP Mobility Defining IP Mobility Defining IP Mobility IP Mobility Models IP Mobility Models IP Mobility Models Typical network architecture Typical network architecture Typical network architecture Assets Assets Assets Internet Threat Model Internet Threat Model Internet Threat Model – – – A Recap A Recap A Recap Routing and IP Mobility Routing and IP Mobility Routing and IP Mobility

Security analysis of IP mobility protocols Security analysis of IP mobility protocols

– – Threats to IP mobility Threats to IP mobility “ “providers providers” ” – – Threats to IP mobility Threats to IP mobility “ “recipients recipients” ” – – Off Off-

  • path vs. on

path vs. on-

  • path attacks

path attacks – – Threats enabled by mobility protocols Threats enabled by mobility protocols

Security Requirements Security Requirements Security Requirements Security Models Security Models Security Models

slide-12
SLIDE 12

IETF IETF-

  • 67 INT Area

67 INT Area 12 12

Threats to IP Mobility Provider Threats to IP Mobility Provider

Provider Provider’ ’s interests s interests

– – Ensuring that only authorized entities obtain the service Ensuring that only authorized entities obtain the service

Ensuring that service is provided as intended Ensuring that service is provided as intended

– – Only entities served by the provider are able to create state at Only entities served by the provider are able to create state at the mobility agent the mobility agent

Threats to mobility Threats to mobility “ “agents agents” ”

– – Creation of state by unauthorized nodes Creation of state by unauthorized nodes – – Creation of incorrect state for valid nodes Creation of incorrect state for valid nodes

Threats to mobility Threats to mobility “ “facilitators facilitators” ”

– – Creation of spurious state at the facilitator Creation of spurious state at the facilitator – – Use of facilitator to disrupt IP mobility Use of facilitator to disrupt IP mobility

slide-13
SLIDE 13

IETF IETF-

  • 67 INT Area

67 INT Area 13 13

Threats to IP Mobility Recipient Threats to IP Mobility Recipient

Recipient Recipient’ ’s interests s interests

– – Ensuring undisrupted IP mobility service Ensuring undisrupted IP mobility service

Threats to recipients Threats to recipients

– – Redirection Redirection

Recipient Recipient’ ’s traffic being redirected elsewhere s traffic being redirected elsewhere

– – DDoS DDoS

Recipient being victim to a DDoS attack and receiving spurious Recipient being victim to a DDoS attack and receiving spurious traffic traffic

– – DoS DoS

Disruption in IP mobility service Disruption in IP mobility service Redirection may lead to DoS Redirection may lead to DoS

slide-14
SLIDE 14

IETF IETF-

  • 67 INT Area

67 INT Area 14 14

Mobility Protocols Facilitate Attacks Mobility Protocols Facilitate Attacks

Mobility protocols have a unique feature Mobility protocols have a unique feature ☺ ☺

– – Any node on the network is a potential victim Any node on the network is a potential victim

Mobility signaling supplants routing state! Mobility signaling supplants routing state!

Set of assets expanded beyond mobility providers and recipients Set of assets expanded beyond mobility providers and recipients Redirection of traffic belonging to other nodes Redirection of traffic belonging to other nodes DDoS on any node in the Internet DDoS on any node in the Internet

– – IP mobility provides one more way of realizing a DDoS attack IP mobility provides one more way of realizing a DDoS attack – – Is it significantly easier to launch a DDoS using IP mobility pr Is it significantly easier to launch a DDoS using IP mobility protocols?

  • tocols?

Perhaps! Perhaps! Traceability factors into the equation Traceability factors into the equation

slide-15
SLIDE 15

IETF IETF-

  • 67 INT Area

67 INT Area 15 15

The Power of an Off The Power of an Off-

  • path Attacker

path Attacker

IP mobility protocols make an off IP mobility protocols make an off-

  • path attacker as powerful as

path attacker as powerful as an on an on-

  • path attacker

path attacker Redirection Redirection

– – Attacker registers victim Attacker registers victim’ ’s address as the s address as the “ “anchor anchor” ” address address

Distributed DoS Distributed DoS

– – Attacker registers victim Attacker registers victim’ ’s address as the s address as the “ “transient transient” ” address address

DoS attack on a mobile node DoS attack on a mobile node Reflection attacks Reflection attacks Passive attacks alone are not a concern Passive attacks alone are not a concern

– – Mobility protocols themselves don Mobility protocols themselves don’ ’t require confidentiality t require confidentiality

Confidentiality for IP location privacy may change this Confidentiality for IP location privacy may change this

– – Data confidentiality can be achieved using end Data confidentiality can be achieved using end-

  • to

to-

  • end security

end security

slide-16
SLIDE 16

IETF IETF-

  • 67 INT Area

67 INT Area 16 16

Redirection Attacks Redirection Attacks

B (IPb)

I P a x : : I P b

A (IPax) MA

(prefix X)

Data (IPax)

A (IPax) MA

(prefix X)

B (IPb)

Data (IPax) Redirection of a victim Redirection of a victim’ ’s traffic to the attacker s traffic to the attacker Target victims are nodes (fixed & mobile) on the prefix of the Target victims are nodes (fixed & mobile) on the prefix of the mobility agent mobility agent

slide-17
SLIDE 17

IETF IETF-

  • 67 INT Area

67 INT Area 17 17

Distributed DoS Attacks Distributed DoS Attacks

B (IPbx, IPb)

I P b x : : I P a

A (IPa) MA

(prefix X)

A (IPa) MA

(prefix X)

B (IPb)

Data (IPbx)

C D

Redirection of the attacker Redirection of the attacker’ ’s traffic to the victim s traffic to the victim DDoS can be caused by a variety of other ways, but IP mobility DDoS can be caused by a variety of other ways, but IP mobility allows amplification allows amplification

slide-18
SLIDE 18

IETF IETF-

  • 67 INT Area

67 INT Area 18 18

Denial of Service Attacks Denial of Service Attacks

B (IPb)

I P a x : : I P b

A (IPax) MA

(prefix X)

A (IPax, IPa) MA

(prefix X)

IPax :: IPa

B (IPb) A (IPax, IPa) MA

(prefix X)

IPax :: IPa

B (IPb)

IPax :: IPb

Disruption of service for an MN due to packet deletion/ modifica Disruption of service for an MN due to packet deletion/ modification/ tion/ bogus registrations bogus registrations

slide-19
SLIDE 19

IETF IETF-

  • 67 INT Area

67 INT Area 19 19

Reflection Attacks Reflection Attacks

A C B

Cause responses to be sent to a victim (DDoS) Cause responses to be sent to a victim (DDoS) Cause packets meant for the wrong address to be sent to the vict Cause packets meant for the wrong address to be sent to the victim im (forced redirection) (forced redirection)

slide-20
SLIDE 20

IETF IETF-

  • 67 INT Area

67 INT Area 20 20

Outline Outline

Introduction and Goals Introduction and Goals Introduction and Goals Defining IP Mobility Defining IP Mobility Defining IP Mobility IP Mobility Models IP Mobility Models IP Mobility Models Typical network architecture Typical network architecture Typical network architecture Assets Assets Assets Internet Threat Model Internet Threat Model Internet Threat Model – – – A Recap A Recap A Recap Routing and IP Mobility Routing and IP Mobility Routing and IP Mobility Security analysis of IP mobility protocols Security analysis of IP mobility protocols Security analysis of IP mobility protocols

Security Requirements Security Requirements

– – Channel security Channel security – – IP Address Authorization IP Address Authorization – – Entity Authorization Entity Authorization – – Protection against unrelated entities Protection against unrelated entities – – Protection for unrelated entities Protection for unrelated entities Security Models Security Models Security Models

slide-21
SLIDE 21

IETF IETF-

  • 67 INT Area

67 INT Area 21 21

Security Requirements Security Requirements

Channel Security Channel Security

– – Data Origin Authentication Data Origin Authentication

Integrity Protection Integrity Protection

– – Replay Protection Replay Protection

IP Address Authorization IP Address Authorization Entity Authorization Entity Authorization Protection against compromise of non Protection against compromise of non-

  • critical assets

critical assets Protection for non Protection for non-

  • participants

participants

slide-22
SLIDE 22

IETF IETF-

  • 67 INT Area

67 INT Area 22 22

Channel Security Channel Security

Data Origin Data Origin Authentication

Authentication – – Ensures creation of state at the mobility Ensures creation of state at the mobility agent strictly by authorized nodes agent strictly by authorized nodes

Integrity Protection Integrity Protection

– – Really the same as data origin Really the same as data origin authentication! authentication! – – Protects against redirection, MiTM, DoS and Protects against redirection, MiTM, DoS and DDoS attacks DDoS attacks

Replay Protection Replay Protection

– – Protects against redirection, MiTM, DoS and Protects against redirection, MiTM, DoS and DDoS attacks DDoS attacks A MA E

SC (A-MA)

C B

SC (B-MA)

D A, B, MA – Signaling Endpoints C, D – On-path Attackers E – Off-path Attacker SC (A-MA) – Unique Secure Channel b/w A & MA SC (B-MA) – Unique Secure Channel b/w B & MA

Shared secure channels do not provide channel security!

slide-23
SLIDE 23

IETF IETF-

  • 67 INT Area

67 INT Area 23 23

IP Address Authorization (1/2) IP Address Authorization (1/2)

Authorization for Authorization for “ “anchor anchor” ” address address

– – MIP HoA, FMIP pCoA, HMIP MIP HoA, FMIP pCoA, HMIP RCoA, NETLMM LoA RCoA, NETLMM LoA

Ensures IP mobility service only Ensures IP mobility service only for authorized nodes for authorized nodes Protects against redirection, Protects against redirection, MiTM, and DoS attacks MiTM, and DoS attacks

A (IPax, IPa) MA

(prefix X)

B (IPbx, IPb)

Without authorization on the address being served, a lot breaks!

IPax :: IPa I P a x : : I P b

Authzn: A IPax B IPax State: IPax :: IP1

slide-24
SLIDE 24

IETF IETF-

  • 67 INT Area

67 INT Area 24 24

IP Address Authorization (2/2) IP Address Authorization (2/2)

Authorization for Authorization for “ “transient transient” ” address address

– – MIP CoA, FMIP nCoA, HMIP LCoA, MIP CoA, FMIP nCoA, HMIP LCoA, NETLMM MAG NETLMM MAG

Prevents a DDoS attack Prevents a DDoS attack Attack needs to be detectable at a Attack needs to be detectable at a minimum minimum

– – Authorization of Authorization of “ “anchor anchor” ” address allows address allows detection of attack detection of attack

A (IPa) X B (IPbx, IPb)

If not protected or detectable, this would be an easier way to launch a DDoS attack on any node!

I P b x : : I P a

State: IPax :: IP1 and/or IPbx :: IP1

slide-25
SLIDE 25

IETF IETF-

  • 67 INT Area

67 INT Area 25 25

Entity Authorization Entity Authorization

Entity: Signaling endpoint Entity: Signaling endpoint

– – A and B are the A and B are the “ “entities entities” ”

Ensures IP mobility service for a given Ensures IP mobility service for a given node only by authorized nodes node only by authorized nodes Two parts to entity authorization Two parts to entity authorization

– – Is the entity part of the domain? Is the entity part of the domain? – – Is the MN actually at the entity? Is the MN actually at the entity?

Particularly a concern in network Particularly a concern in network-

  • based

based mobility mobility

MA

(prefix X)

Without entity authorization, compromise of the entity leads to compromise of any mobility session in the domain!

IPx1 :: IPa I P x 1 : : I P b

A (IPa) B (IPb) MN (IPx1)

Authzn: A IPx1 B IPx1 State: IPx1 :: A

slide-26
SLIDE 26

IETF IETF-

  • 67 INT Area

67 INT Area 26 26

Protection Against Non Protection Against Non-

  • Critical Asset Compromise

Critical Asset Compromise

MN MA

AR AR

MN

Ensures service is not disrupted Ensures service is not disrupted by non signaling entities by non signaling entities Mitigates domino effects Mitigates domino effects Ensures service via Ensures service via uncompromised entities uncompromised entities

– – Entities: AR, HMIP AR, MIP4 FA, Entities: AR, HMIP AR, MIP4 FA, NETLMM MAG, FMIP nAR NETLMM MAG, FMIP nAR

Compromise of one entity MUST NOT impact sessions traversing other entities!

slide-27
SLIDE 27

IETF IETF-

  • 67 INT Area

67 INT Area 27 27

Domino Effect Mitigation Domino Effect Mitigation

Keys MUST be scoped for a given purpose Keys MUST be scoped for a given purpose

– – Same key must not be used for different purposes Same key must not be used for different purposes

Keys MUST be scoped to the signaling endpoints Keys MUST be scoped to the signaling endpoints

– – No key sharing! No key sharing!

Non Non-

  • critical assets MUST NOT be key distributors or

critical assets MUST NOT be key distributors or trust anchors! trust anchors!

slide-28
SLIDE 28

IETF IETF-

  • 67 INT Area

67 INT Area 28 28

Protection for Unrelated Entities Protection for Unrelated Entities

Ensures non Ensures non-

  • participants are

participants are unaffected by IP mobility sessions unaffected by IP mobility sessions Allows routing and IP mobility to Allows routing and IP mobility to co co-

  • exist

exist

IP mobility must not cause vulnerabilities to nodes not employing the protocol!

MA MN C

slide-29
SLIDE 29

IETF IETF-

  • 67 INT Area

67 INT Area 29 29

Takeaways Takeaways

1.

  • 1. Channel security

Channel security

2.

  • 2. IP address authorization

IP address authorization

3.

  • 3. Entity authorization

Entity authorization

4.

  • 4. Trust anchors should be security infrastructure entities

Trust anchors should be security infrastructure entities

5.

  • 5. Key distributor must be located

Key distributor must be located “ “above above” ” the key recipient the key recipient

6.

  • 6. Key scoping

Key scoping

7.

  • 7. No key sharing

No key sharing

8.

  • 8. Prevent domino effects

Prevent domino effects

9.

  • 9. Analyze applicable threat and security models

Analyze applicable threat and security models

10.

  • 10. Adhere to security model

Adhere to security model-

  • specific guidelines

specific guidelines

slide-30
SLIDE 30

Backup Slides Backup Slides

slide-31
SLIDE 31

IETF IETF-

  • 67 INT Area

67 INT Area 31 31

Outline Outline

Introduction and Goals Introduction and Goals Introduction and Goals Defining IP Mobility Defining IP Mobility Defining IP Mobility IP Mobility Models IP Mobility Models IP Mobility Models Typical network architecture Typical network architecture Typical network architecture Assets Assets Assets Internet Threat Model Internet Threat Model Internet Threat Model – – – A Recap A Recap A Recap Routing and IP Mobility Routing and IP Mobility Routing and IP Mobility Security analysis of IP mobility protocols Security analysis of IP mobility protocols Security analysis of IP mobility protocols Security Requirements Security Requirements Security Requirements

Security Models Security Models

– – AAA AAA-

  • based model

based model – – Role of EAP in IP mobility Role of EAP in IP mobility – – Role of IPsec in IP mobility Role of IPsec in IP mobility – – CGA CGA-

  • based model

based model

slide-32
SLIDE 32

IETF IETF-

  • 67 INT Area

67 INT Area 32 32

Security Models Security Models

Various security models in use in different networks Various security models in use in different networks Security Model Considerations Security Model Considerations

– – Presence of infrastructure entity Presence of infrastructure entity

E.g., AAA, PKI E.g., AAA, PKI

– – Need for infrastructure Need for infrastructure-

  • less security

less security

E.g., CGA, self E.g., CGA, self-

  • signed

signed certs certs

– – Use of existing security protocols Use of existing security protocols

E.g., IPsec, IKEv2, EAP E.g., IPsec, IKEv2, EAP

– – End End-

  • to

to-

  • end vs. hop

end vs. hop-

  • by

by-

  • hop security

hop security

E.g., TLS, IPsec E.g., TLS, IPsec

Popular security models Popular security models

– – AAA AAA-

  • based authentication/authorization

based authentication/authorization – – Use of EAP for authentication Use of EAP for authentication – – Use of IPsec for channel security and address authorization Use of IPsec for channel security and address authorization – – Use of CGAs for infrastructure Use of CGAs for infrastructure-

  • less SA creation

less SA creation

Threat analysis and security requirements conformance are vital Threat analysis and security requirements conformance are vital

slide-33
SLIDE 33

IETF IETF-

  • 67 INT Area

67 INT Area 33 33

AAA AAA-

  • based Authentication/Authorization

based Authentication/Authorization

Why AAA? Why AAA?

– – Allows re Allows re-

  • use of AAA

use of AAA-

  • based credentials

based credentials – – Several managed networks use AAA Several managed networks use AAA – – Authentication and authorization are AAA functions Authentication and authorization are AAA functions

Authorization in AAA is different from IP address authorization Authorization in AAA is different from IP address authorization

What should AAA What should AAA-

  • based solutions conform to?

based solutions conform to?

– – draft draft-

  • housley

housley-

  • aaa

aaa-

  • key

key-

  • management

management (soon to be a BCP) (soon to be a BCP)

slide-34
SLIDE 34

IETF IETF-

  • 67 INT Area

67 INT Area 34 34

EAP in IP Mobility Protocol Security EAP in IP Mobility Protocol Security

Why EAP? Why EAP?

– – EAP EAP-

  • based network

based network-

  • access authentication is popular

access authentication is popular – – Re Re-

  • use protocol supported by the MN and infrastructure

use protocol supported by the MN and infrastructure

Trends in using EAP Trends in using EAP

– – Minimize the number of authentications Minimize the number of authentications

Given, same credentials and the same server Given, same credentials and the same server

– – Leveraging keys produced by one run of EAP for other purposes Leveraging keys produced by one run of EAP for other purposes – – Limiting re Limiting re-

  • use to protocol and performing another EAP run for

use to protocol and performing another EAP run for IP mobility protocol security IP mobility protocol security

So, what usages of EAP for IP mobility protocol security So, what usages of EAP for IP mobility protocol security are appropriate? are appropriate?

slide-35
SLIDE 35

IETF IETF-

  • 67 INT Area

67 INT Area 35 35

EAP Usage Guidelines EAP Usage Guidelines

Distinguish network access from IP mobility Distinguish network access from IP mobility

– – One occurs *prior* to obtaining IP access; the other occurs afte One occurs *prior* to obtaining IP access; the other occurs after r

Use of EAP in IKEv2 for authentication is allowed and Use of EAP in IKEv2 for authentication is allowed and recommended recommended Follow EAP guidelines on key usages Follow EAP guidelines on key usages

– – EAP MSK is provided to the authenticator for network access cont EAP MSK is provided to the authenticator for network access control rol

Usage of MSK for other purposes gets into bad cryptographic Usage of MSK for other purposes gets into bad cryptographic practices practices Usage of MSK involves the NAS in IP mobility protocol security Usage of MSK involves the NAS in IP mobility protocol security

Use of EMSK Use of EMSK-

  • based keys for IP mobility protocol security is yet to

based keys for IP mobility protocol security is yet to be evaluated be evaluated

– – General concerns on layer violations General concerns on layer violations – – Efforts underway to make the EMSK hierarchy generic to ensure fu Efforts underway to make the EMSK hierarchy generic to ensure future ture usage usage – – No consensus yet on whether this is good or bad No consensus yet on whether this is good or bad

slide-36
SLIDE 36

IETF IETF-

  • 67 INT Area

67 INT Area 36 36

IPsec in IP Mobility Protocol Security IPsec in IP Mobility Protocol Security

IPsec typically provides channel security IPsec typically provides channel security Tying IP address authorization to IPsec Tying IP address authorization to IPsec

– – Assign IP address using IKEv2 and tie the IPsec SA to it Assign IP address using IKEv2 and tie the IPsec SA to it

Limited flexibility in address assignment Limited flexibility in address assignment

IPsec with Dynamic Keying IPsec with Dynamic Keying

– – Use of IKEv2 is a recommended approach Use of IKEv2 is a recommended approach

IPsec with Manual Keying IPsec with Manual Keying

– – Cumbersome Cumbersome – – No Replay protection No Replay protection – – Address authorization needs static address provisioning Address authorization needs static address provisioning

The necessary security properties are realizable using IPsec and The necessary security properties are realizable using IPsec and IKEv2 IKEv2 Limitations of IKEv2 and IPsec Limitations of IKEv2 and IPsec

– – Frequent signaling endpoint changes (e.g., FMIP) needs new Frequent signaling endpoint changes (e.g., FMIP) needs new IKE_SAs IKE_SAs – – IKEv2 exchanges add undesirable overhead IKEv2 exchanges add undesirable overhead

slide-37
SLIDE 37

IETF IETF-

  • 67 INT Area

67 INT Area 37 37

CGA in IP Mobility Protocol Security CGA in IP Mobility Protocol Security

Allows infrastructure Allows infrastructure-

  • less operation

less operation

– – Useful in networks that care less about access control and more Useful in networks that care less about access control and more about address authorization about address authorization

Considerations in using CGAs Considerations in using CGAs

– – Differentiate between CGAs and SeND Differentiate between CGAs and SeND

SeND uses CGAs SeND uses CGAs

– – CGAs provide the infrastructure CGAs provide the infrastructure-

  • less security

less security

CGAs do not mean AR involvement CGAs do not mean AR involvement

– – Consider use of CGAs in IKEv2 to re Consider use of CGAs in IKEv2 to re-

  • use IPsec

use IPsec

Currently undocumented Currently undocumented

– – Consider if use of self Consider if use of self-

  • signed certificates will work

signed certificates will work

Currently documented for IKEv2 Currently documented for IKEv2

– – Evaluate if use of CGAs satisfies all security requirements Evaluate if use of CGAs satisfies all security requirements