Proving IEEE 802.11i Secure Mukund Sundararajan Joint work with - - PowerPoint PPT Presentation

proving ieee 802 11i secure
SMART_READER_LITE
LIVE PREVIEW

Proving IEEE 802.11i Secure Mukund Sundararajan Joint work with - - PowerPoint PPT Presentation

CS259: Security Analysis of Network Protocols, Winter 2008 Proving IEEE 802.11i Secure Mukund Sundararajan Joint work with Changhua He, Arnab Roy, Anupam Datta, Ante Derek, John Mitchell 802.11i Key Management Auth Laptop Access Server


slide-1
SLIDE 1

CS259: Security Analysis of Network Protocols, Winter 2008

Proving IEEE 802.11i Secure

Mukund Sundararajan

Joint work with Changhua He, Arnab Roy, Anupam Datta, Ante Derek, John Mitchell

slide-2
SLIDE 2

802.11i Key Management

Auth Server Laptop Access Point

TLS: Uses Certificates, provides authentication

(Shared Secret-PMK)

4WAY Handshake: Creates keys for data communication

Group key handshake: Keys for broadcast communication Data protection: AES based

slide-3
SLIDE 3

Properties of 802.11i Key Mgt.

Roughly

  • Only authorized devices can join n/w
  • Devices do not join rogue n/w
  • Peer device is alive
  • Keys set up for data and group

communication are fresh and secret

slide-4
SLIDE 4

Proof of 802.11i security

A Formal Proof in Protocol Composition Logic (PCL) of : On execution of an 802.11i role, properties listed in the standard are satisfied. Attacker model (perfect crypto)

  • Intercept, read, reorder, delete any message
  • n the n/w
  • Construct, send messages
slide-5
SLIDE 5

Why a Proof?

[He Mitchell] analyzed 4Way Handshake using Murphi

  • Found a DoS attack
  • But did not find any security flaws

[Mitchell Shmatikov] analyzed TLS ‘Finite’ state analysis does not guarantee security

slide-6
SLIDE 6

Model Checking does’nt Scale

Laptop A.P. A.S.

Group key Supplicant

802.11i

EAP-TLS Server EAP-TLS Client

4WAY Supplicant 4WAY Authenticator

Group key Authenticator

slide-7
SLIDE 7

TLS Server Role

receive C, S, nc, suiteC //Hello new ns send S, C, ns, suiteS //Resp receive C, S, {sec}Ks , SIGC(hshk1) //Xfer check SIGC(hshk1) decrypt {sec}Ks send S, C, hashsec(hshk2) //ServerView

slide-8
SLIDE 8

Security Properties of TLS

The client and the server agree on

  • Value of the secret
  • Version and crypto suite
  • Identities (mutual authentication)
  • Protocol completion status

The secret term is not known to a principal who is not the client or the server (shared secret)

slide-9
SLIDE 9

Matching Conversations

Honest(C) [TLS Server]S∃ C. Send ( C, Hello) < Receive ( S, Hello ) ∧ Receive ( S, Hello ) < Send ( S, Resp) ∧ Send ( S, Resp) < Receive( C, Resp) ∧ Receive( C, Resp) < Send ( C, KeyXfer) ∧ Send ( C, KeyXfer) < Receive ( S, KeyXfer) ∧ Receive ( S, KeyXfer) < Send( S,ServerView)

slide-10
SLIDE 10

Proof Sketch

  • 1. S sees SIGC(hshk1) concludes C

constructed it

  • 4. If honest C constructed SIGC(hshk1),

then it executed actions consistent with TLS Client role

  • 5. Order actions based on freshness of

nonces

slide-11
SLIDE 11

Some Axioms Used in the Proof

slide-12
SLIDE 12

Program Invariant used in Proof

slide-13
SLIDE 13

Proof of TLS Authentication

slide-14
SLIDE 14

Matching Conversations!

slide-15
SLIDE 15

Proof Structure

Group key Supplicant

EAP-TLS Server EAP-TLS Client

4WAY Supplicant 4WAY Authenticator

Group key Authenticator

Local Reasoning Based on actions And cryptography Program Invariants Pre-conditions

slide-16
SLIDE 16

Protocol Insights

802.11i is secure Other modes are safe

  • Using Cached PMKs and Pre-shared Keys

is safe

  • Safe under error handling

Protocols can share certificates with TLS as long as conditions listed in paper are satisfied

slide-17
SLIDE 17

Evolution of WLAN Security

Wired Equivalent Privacy

  • Incorrect use of cryptography
  • WEP lacks key mgt

802.11i is designed to fix these issues (June 2004) [He Mitchell] uncovers DoS attacks Fix adopted by standards committee Security Proof of 802.11i

slide-18
SLIDE 18

Error Handling [HM05]

Stage 1: Network and Security Capability Discovery Stage 2: 802.1X Authentication (mutual authentication, shared secret, cipher suite) Stage 3: Secure Association (management frames protected) Stage 4: 4-Way Handshake (PMK confirmation, PTK derivation, and GTK distribution) Stage 5: Group Key Handshake Stage 6: Secure Data Communications

Michael MIC Failure or Other Security Failures Group Key Handshake Timeout 4-Way Handshake Timeout Association Failure 802.1X Failure

slide-19
SLIDE 19

Interactions can cause Flaws

Exercise: Construct two protocols. Each does something reasonable. Each is secure in isolation. But, if any principal executes both protocols, one of the two protocols is insecure.

  • Chosen protocol attack (Wagner et.al.)
slide-20
SLIDE 20

Thanks!