60
Mar 22, 2010 IETF NEA Meeting 1 NEA Working Group (oauth is in Redondo!) IETF 77 Mar 22, 2010 nea[[email protected] http://tools.ietf.org/wg/nea Co-chairs: Steve Hanna [email protected] Susan Thomson [email protected]

NEA Working Group ( oauth is in Redondo!) IETF 77 Mar 22, 2010

  • Upload
    shayla

  • View
    56

  • Download
    1

Embed Size (px)

DESCRIPTION

NEA Working Group ( oauth is in Redondo!) IETF 77 Mar 22, 2010. nea[[email protected] http://tools.ietf.org/wg/nea Co-chairs: Steve Hanna [email protected] Susan Thomson [email protected]. Agenda Review. 1300 Administrivia Jabber & Minute scribes Agenda bashing - PowerPoint PPT Presentation

Citation preview

Mar 22, 2010 IETF NEA Meeting 1

NEA Working Group(oauth is in Redondo!)

IETF 77Mar 22, 2010

nea[[email protected]://tools.ietf.org/wg/nea

Co-chairs: Steve Hanna [email protected] Susan Thomson [email protected]

Mar 22, 2010 IETF NEA Meeting 2

Agenda Review1300 Administrivia

Jabber & Minute scribesAgenda bashing

1305 WG Status1310 Summary of NEA WG virtual interim meeting1315 Review PT submissions http://www.ietf.org/id/draft-sangster-nea-pt-tls-00.txt

http://www.ietf.org/id/draft-hanna-nea-pt-eap-00.txt http://www.ietf.org/id/draft-cam-winget-eap-nea-tlv-00.txt http://www.ietf.org/id/draft-cam-winget-eap-tlv-00.txt1330 Discuss MITM attack and counter-measure 1350 Discuss how proposals meet PT requirements 1400 Discuss impact on existing supplicants for EAP-based PT 1405 Discuss feedback from ADs re EAP process1425 Discuss PT proposals1440 Consensus Check1450 Discuss Next Steps1500 Adjourn

Mar 22, 2010 IETF NEA Meeting 3

WG Status

• Published as RFC:– PA-TNC: RFC 5792 (Mar 2010)– PB-TNC: RFC 5793 (Mar 2010)

• Individual PT proposals submitted (Jan 4)

• Virtual interim NEA WG meeting held (Jan 28)

Mar 22, 2010 IETF NEA Meeting 4

Summary of Interim NEA WG Meeting

Mar 22, 2010 IETF NEA Meeting 5

Agenda

• Reviewed PT submissions: TLS– http://www.ietf.org/id/draft-sangster-nea-pt-tls-00.txt

• Reviewed PT submissions: EAP– http://www.ietf.org/id/draft-hanna-nea-pt-eap-00.txt– http://www.ietf.org/id/draft-cam-winget-eap-nea-tlv-00.txt– http://www.ietf.org/id/draft-cam-winget-eap-tlv-00.txt

• Consensus check on adopting proposals as -00 WG drafts

• Discussed Next Steps

Mar 22, 2010 IETF NEA Meeting 6

Consensus Check Questions

• Do you support work on TLS-based PT?– Yes– No– Defer (decision pending some further action taking place)

-> Meeting Result: Yes• Do you support adoption of PT-TLS as a -00 WG draft?

– Yes– No – Defer (decision pending some further action taking place)

-> Meeting Result: No consensus

Mar 22, 2010 IETF NEA Meeting 7

Consensus Check Questions

• Do you support work on EAP-based PT?– Yes– No– Defer (decision pending some further action taking place)

-> Meeting Result: Yes• What should we adopt as EAP-based PT?

– EAP-TNC– NEA TLV– Other

-> Meeting Result: No consensus

Mar 22, 2010 IETF NEA Meeting 8

Main Issues

• PT-TLS– Client authentication framework

• PT-EAP– Trust model, threat and counter-measure

• NEA-TLV– Disagreement on whether NEA-TLV meets NEA requirements

• General EAP– Disagreement on dependency on EMU WG

Mar 22, 2010 IETF NEA Meeting 9

Action Items

• Describe MITM attack and the D-H PN countermeasure.

• Discuss how proposals meet PT requirements

• Determine impact on existing supplicants

• Consult with AD on process for standardizing EAP-based PT.

PT-TLS Overview

March 22, 2010 10NEA-WG @ IETF 77

March 22, 2010 NEA-WG @ IETF 77 11

What is PT-TLS?

• L3 PT Proposal from TCG– Identical to TCG protocol IF-T Binding to TLS

• NEA Exchange Over TLS– Carried As Application Data– No Change to TLS

• Meets All Applicable PT Requirements

March 22, 2010 NEA-WG @ IETF 77 12

Use Cases for PT-TLS• NEA Assessment on Non-802.1X Network

– Legacy Network– Remote Access

• Large Amount of Data in NEA Assessment– For example, Installed Packages– Unsuitable for EAP Transport

• Posture Re-assessment or Monitoring After 802.1X Assessment

• Application Server Needs to Perform NEA Assessment

March 22, 2010 NEA-WG @ IETF 77 13

Three Phases of PT-TLS

1. TLS Handshake– Unmodified

2. Pre-Negotiation– Version Negotiation– Optional Extensible Client Authentication

3. Data Transport– NEA Assessments

March 22, 2010 NEA-WG @ IETF 77 14

PT-TLS Sequence DiagramPT-TLSInitiator

PT-TLSResponder

TLS Handshake

Version Request

Version Response

Optional Client Authentication

PB-TNC Exchange

…TLS Closure Alerts

March 22, 2010 NEA-WG @ IETF 77 15

PT-TLS Message Format 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Reserved | Message Type Vendor ID |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Message Type |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Message Length |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Message Identifier |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+| Message Value (e.g. PB-TNC Batch) . . . |+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

March 22, 2010 NEA-WG @ IETF 77 16

PT-EAP Overview

March 22, 2010 NEA-WG @ IETF 77 17

What is PT-EAP?• L2 PT Proposal from TCG

– Identical to TCG protocol EAP-TNC (aka IF-T Protocol Bindings for Tunneled EAP Methods)

• NEA Exchange Over EAP Tunnel Methods– Supports PEAP, EAP-TTLS, and EAP-FAST– No Change to the EAP Tunnel Methods

• Meets All PT Requirements

March 22, 2010 NEA-WG @ IETF 77 18

Use Cases for PT-EAP• NEA Assessment on 802.1X Network

– Consider posture in network access decision– Isolate vulnerable endpoints during remediation– Block or quarantine infected endpoints

• NEA Assessment during IKEv2 Handshake– Assess posture before granting network access– Isolate vulnerable endpoints during remediation– Block or quarantine infected endpoints

March 22, 2010 NEA-WG @ IETF 77 19

PT-EAP Operation• Runs as an inner EAP method

– Can be chained with other EAP methods for user or endpoint authentication

– Supports key derivation, allowing inner method to be cryptographically tied to tunnel

– Supports fragmentation and reassembly, when needed

• Due to EAP limitations…– Only one packet in flight (half duplex)– Large data transfer not recommended

March 22, 2010 NEA-WG @ IETF 77 20

Three Phases of PT-EAP

1. Optional Diffie-Hellman Pre-Negotiation– Establishes initial key

2. PB-TNC Exchange– NEA Assessments– Hashed into eventual key

3. Optional Key Derivation and Export

March 22, 2010 NEA-WG @ IETF 77 21

PT-EAP Sequence DiagramEAPPeer

EAPAuthenticator

EAP Tunnel Setup

Optional D-H Pre-Negotiation

PB-TNC Exchange

Optional Key Derivation and Export

March 22, 2010 NEA-WG @ IETF 77 22

PT-EAP Message Format 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Code | Identifier | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Type | Flags | Ver | Data Length * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Data Length * | Data ... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+

* Only when using fragmentation

March 22, 2010 NEA-WG @ IETF 77 23

Pros of PT-EAP• EAP method

– Works with any EAP Tunnel Method

• Optional key derivation and export– Allows protection against Asokan attack

• Equivalent to TCG’s EAP-TNC– Open standard with many implementations– Years of experience and security reviews

• No external dependencies– Easy to move to Proposed Standard

• Scalable– Supports PB-TNC messages up to 2^32 – 1 bytes via fragmentation

March 22, 2010 NEA WG 24

EAP-NEA-TLV

Nancy Cam-Winget [email protected] Zhou [email protected]

March 22, 2010 NEA WG 25

EAP TLV Overview

Proposal

• Facilitate the use of an EAP Tunnel Based Method to carry PB-TNC messages

• EAP Tunnel Based Method provides:– Server authentication MUST be enforced– Mutual authentication SHOULD occur

between NEA Client and NEA Server– Protected tunnel to transport PB-TNC

messages

March 22, 2010 NEA WG 26

March 22, 2010 NEA WG 27

What is EAP TLV?• General container format to facilitate transport of

any data (like channel and crypto binding) inside an EAP Tunnel Based Method, for NEA it can also transport PB-TNC messages

• NEA Use cases: 802.1X or IKEv2– (NEA) posture assessment in network access

decision– Remediation thru isolation of vulnerable endpoints– Quarantine or block infected endpoints

EAP NEA TLV Encapsulation

0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- |M|R| TLV Type | Length | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | | | PB-TNC Header | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+- | PB-PA Message.... | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-

EAP Tunnel w/ EAP TLV Protocol Layers

Protected Tunnel

PB-TNC

EAP-TLV Encapsulation (TLVs)

Cleartext Headers

Tunnel establishment (e.g. TLS)

Tunnel Based EAP method

EAP

Carrier Protocol (EAPOL, RADIUS, Diameter, etc.)

Low

er to

Upp

er la

yers

EAP + NEA Potential SequencingASPeer

EAP ID Request

EAP ID Response

EAP Method Tunnel Establishment

EAP-Tunnel Method Start

EAP-NEA-TLV ( PB-TNC Header (PB-TNC Message (PA-TNC Message…..) )

EAP-NEA-TLV ( PB-TNC Header (PB-TNC Message (PA-TNC Message…..) )

March 22, 2010 NEA WG 31

Features of EAP NEA TLV• EAP NEA TLV:

– simple construct used inside EAP tunnel– flexible and extensible construction to transport NEA messages– if keying material is needed, can use RFC 5705

• Relies on EAP Tunneled Method to:– Provide mutual authentication either during tunnel establishment

or through an inner EAP (authentication) method (or both)– Addresses MITM considerations through crypto binding– Provide confidentiality and integrity thru the protected tunnel– Provide fragmentation and reassembly, detect duplicates, and

reorder • EAP features:

– Half Duplex (only one packet at a time)– Simple congestion control (thru half duplex property)– Works in both 802.1X and IKEv2

March 22, 2010 NEA-WG @ IETF 77 32

Asokan Attack on NEA:Explanation and Countermeasure

Basic Asokan Attack

March 22, 2010 NEA-WG @ IETF 77 33

CorpServer

CorpAP

SpyLaptop

CorpLaptop SpyServer

SpyAP

N

N

SpyUser

N

CorpUser

CorpNetwork

Crypto Binding Countermeasure

March 22, 2010 NEA-WG @ IETF 77 34

CorpServer

CorpAP

SpyLaptop

CorpLaptop SpyServer

SpyAP

N

N

SpyUser

N

CorpUser

CorpNetwork

MK

MKTK1TK1

TK2

TK2

CTK1

CTK2

Asokan Attack on NEA

March 22, 2010 NEA-WG @ IETF 77 35

CorpServer

CorpAP

CorpLaptop

SpyLaptop SpyServer

SpyAP

N

N

CorpUser

NSpyUser

CorpNetwork

TPM

TPM

Crypto Binding Countermeasure

March 22, 2010 NEA-WG @ IETF 77 36

CorpServer

CorpAP

CorpLaptop

SpyLaptop SpyServer

SpyAP

N

N

CorpUser

NSpyUser

CorpNetwork

MK

MKTK1TK1

TK2

TK2

CTK1

CTK2

TPM

TPM

Crypto Bindings Required• RFC 5209C-3 NEA protocols including security capabilities MUST be capable of

protecting against active and passive attacks by intermediaries and endpoints including prevention from replay based attacks.

• draft-ietf-emu-eaptunnel-req-05.txtThe tunnel method MUST provide a mechanism to bind the tunnel protocol and the inner EAP method. This property is referred to as cryptographic binding. Such bindings are an important tool for mitigating the tunnel MitM attacks on tunnel methods [TUNNEL-MITM]. Cryptographic bindings enable the complete prevention of tunnel MitM attacks without the need of additional security policies as long as the inner method derives keys and is not vulnerable to attacks outside a protected tunnel [KHLC07]. Even though weak or non-key deriving inner methods may be permitted, and thus security policies preventing tunnel MitM attacks are still necessary, the tunnel method MUST provide cryptographic bindings, because only this allows migrating to more secure, policy-independent implementations.

March 22, 2010 NEA-WG @ IETF 77 37

Crypto BindingsProvided by D-H PN

• NEA Client and Server Run D-H Exchange– Both Sides Derive D-H Shared Secret (DHS)– Create Two Hashes from DHS:

• UV-1 = HASH(“1” | C-Nonce | S-Nonce | DHS)• UV-2 = HASH(“2” | C-Nonce | S-Nonce | DHS)

• UV-1 Used in TPM Exchange

• Both Sides Compute Running Hash– UV-2 = HASH(UV-2 | HASH(PB Message))

• Export UV-2 from PT-EAP Method– Tunnel Method Mixes UV-2 Into CTK and Confirms Mutual

Knowledge of CTKMarch 22, 2010 NEA-WG @ IETF 77 38

NEA WG

Protocol Requirements• 8.3.1 NEA Requirements on MITM :

“For example, the requirement for PT to be capable of supporting mutual authentication prior to any endpoint assessment message dialogs prevents the attacker from inserting themselves as an active participant (proxy) within the communications without detection (assuming attacker lacks credentials convincing either party it is legitimate). …. The PT requirement for confidentiality protected (encrypted) communications linked to the above authentication prevents a passive MITM from eavesdropping by observing the message dialog and keeping a record of the conformant posture values for future use. “

• Requirement suggests appropriate crypto binding between the tunnel establishment and the authentication exchange

• Requirement suggests protected tunnel is sufficient to address MITM

March 22, 2010 39

NEA WG

What are the PT security requirements?

• Inconsistent security threat models:– PT-TLS abides by 8.3.1 NEA security

considerations while PT-EAP presents proposal for addressing MITM

• Generating keying material with unauthenticated Diffie-Hellman does not necessarily address MITM

• If keying material is needed, other methods exist, e.g. RFC 5705

March 22, 2010 40

March 22, 2010 NEA-WG @ IETF 77 41

Discussion

March 22, 2010 NEA-WG @ IETF 77 42

How Protocols MeetNEA Requirements

NEA Protocol RequirementsC-1 NEA protocols MUST support multiple round trips between the NEA Client and NEA Server in a

single assessment. C-2 NEA protocols SHOULD provide a way for both the NEA Client and the NEA Server to initiate a

posture assessment or reassessment as needed. C-3 NEA protocols including security capabilities MUST be capable of protecting against active and

passive attacks by intermediaries and endpoints including prevention from replay based attacks.

C-4 The PA and PB protocols MUST be capable of operating over any PT protocolC-5 The selection process for NEA protocols MUST evaluate and prefer the reuse of existing open

standards that meet the requirements before defining new ones. The goal of NEA is not to create additional alternative protocols where acceptable solutions already exist.

C-6 NEA protocols MUST be highly scalable; the protocols MUST support many Posture Collectors on a large number of NEA Clients to be assessed by numerous Posture Validators residing on multiple NEA Servers.

C-7 The protocols MUST support efficient transport of a large number of attribute messages between the NEA Client and the NEA Server.

C-8 NEA protocols MUST operate efficiently over low bandwidth or high latency links. C-9 For any strings intended for display to a user, the protocols MUST support adapting these

strings to the user's language preferences. C-10 NEA protocols MUST support encoding of strings in UTF-8 format [UTF8]. C-11 Due to the potentially different transport characteristics provided by the underlying candidate PT

protocols, the NEA Client and NEA Server MUST be capable of becoming aware of and adapting to the limitations of the available PT protocol

January 28, 2010 NEA WG 44

PT RequirementsPT-1 The PT protocol MUST NOT interpret the contents of PB messages being transported, i.e., the data it is carrying

must be opaque to it.

PT-2 The PT protocol MUST be capable of supporting mutual authentication, integrity, confidentiality, and replay protection of the PB messages between the Posture Transport Client and the Posture Transport Server

PT-3 The PT protocol MUST provide reliable delivery for the PB protocol. This includes the ability to perform fragmentation and reassembly, detect duplicates, and reorder to provide in-sequence delivery, as required.

PT-4 The PT protocol SHOULD be able to run over existing network access protocols such as 802.1X and IKEv2

PT-5 The PT protocol SHOULD be able to run between a NEA Client and NEA Server over TCP or UDP (similar to Lightweight Directory Access Protocol (LDAP))

PT-6 The PT protocol MUST be connection oriented; it MUST support confirmed initiation and close down.

PT-7 The PT protocol MUST be able to carry binary data.

PT-8 The PT protocol MUST provide mechanisms for flow control and congestion control.

PT-9 PT protocol specifications MUST describe the capabilities that they provide for and limitations that they impose on the PB protocol (e.g. half/full duplex, maximum message size).

PT-TLS Claims

• Meets All Applicable NEA Requirements

March 22, 2010 NEA-WG @ IETF 77 45

PT-EAP Claims• Meets All Applicable NEA Requirements

• But…– NEA Server Can’t Initiate Reassessment

• Except With Disconnect-Request or EAPOL-Logoff• Only a SHOULD, Not Expected of L2 Protocols• 802.1X Limit

– Can’t run over TCP or UDP• Except With PANA• Only a SHOULD, Not Expected of L2 Protocols• 802.1X Limit

March 22, 2010 NEA-WG @ IETF 77 46

NEA Protocol RequirementsC-Req Met Description

C-1 ✔ EAP Tunnel Based Methods allow for multiple roundtrips

C-2 − EAP Tunnel Based Method is intended to be used pre-network admission

C-3 ✔ EAP Tunnel Based Method provides tunnel protection against attacks

C-4 ✔ The EAP Tunnel Based Method is independent of both PB and PA

C-5 ✔ EAP Tunnel Based Method is based on the EAP (RFC 3748) standard

C-6 ✔ EAP Tunnel Based Method and EAP TLV container is independent of the NEA collector and validator

C-7 ✔ The number or attributes is limited by the EAP transport; though multiple roundtrips can occur

C-8 ✔ EAP is designed to work with constrained and low latency links

C-9 − EAP in general, does not include strings to be displayed; however support for UTF-8 strings if used in EAP-NEA-TLV can be specified

C-10 − EAP in general, does not include strings, however support for UTF-8 strings if used in EAP-NEA-TLV can be specified

C-11 ✔ EAP Tunnel Based Method implementations can expose the constraints to the respective PB Client and PB Broker

January 28, 2010 NEA WG 47

PT RequirementsPT-Req Met Description

PT-1 ✔ EAP TLV is a generic container allowing pass thru of NEA data; no EAP interpretation and state machine changes are made

PT-2 ✔ EAP Tunnel method supports mutual authentication and tunnel protection

PT-3 − EAP TLV length limit of 2^16, should not be an issue as EAP method is not intended to be used for large data transfers (an L3 method like TLS would be preferable)

PT-4 ✔ EAP is enabled on both 802.1X and IKEv2

PT-5 − The EAP Tunnel Based Method is intended to be used pre-network access

PT-6 ✔ EAP supports initiation and closure

PT-7 ✔ EAP TLV is a general container and allows for binary data to be carried

PT-8 ✔ EAP being half duplex and MTU size limited, congestion and flow is not an issue

PT-9 ✔ EAP is half-duplex with packet size limit as a function of the link

Discussion

Mar 22, 2010 IETF NEA Meeting 49

NEA WG

Concerns with PT-EAP• Draft currently:

– Relies on TPM– Defines interdependency between PT and

TPM which is undefined• Requirement claims:

– Doesn’t Meet C-5: not an existing open standard

• Dependency claims similar to nea-eap-tlv:– Requires a Tunneled EAP method

March 22, 2010 50

Concerns re EAP-NEA-TLV• Doesn’t Meet C-5

– Not an Existing Open Standard• Doesn’t Meet C-7

– Limited to 2^16 – 1 Bytes• Doesn’t Meet PT-2

– No Protection Against Asokan Attack• Doesn’t Meet PT-3

– No Support for Fragmentation• Normative Reference to EAP-TLV

– Just a -00 Independent Submission

March 22, 2010 NEA-WG @ IETF 77 51

Mar 22, 2010 IETF NEA Meeting 52

Impact on Existing Supplicants

Impact on existing supplicants• Consulted with several vendors

• Consensus is can be implemented either way

March 22, 2010 NEA-WG @ IETF 77 53

Mar 22, 2010 IETF NEA Meeting 54

Feedback from ADs re EAP Process

Feedback from AD re EAP process

• Question:– Do we need to wait for a standards track EAP tunnel

method?• AD Response

– No, you don’t need to wait. You can go forward with a standards track PT protocol.

– Can publish Informational RFCs on tunnel-method specific bindings, if necessary

– Can ask EMU WG to accelerate EAP-TLV, if needed

March 22, 2010 NEA-WG @ IETF 77 55

Mar 22, 2010 IETF NEA Meeting 56

PT Protocol Discussion

Mar 22, 2010 IETF NEA Meeting 57

Consensus Check Questions

Mar 22, 2010 IETF NEA Meeting 58

Consensus Check Questions

• Do you support work on TLS-based PT?– Yes– No– Defer (decision pending some further action taking place)

-> Meeting Result: • Do you support adoption of PT-TLS as a -00 WG draft?

– Yes– No – Defer (decision pending some further action taking place)

-> Meeting Result:

Mar 22, 2010 IETF NEA Meeting 59

Consensus Check Questions

• Do you support work on EAP-based PT?– Yes– No– Defer (decision pending some further action taking place)

-> Meeting Result: • What should we adopt as EAP-based PT?

– EAP-TNC– NEA TLV– Other

-> Meeting Result:

Mar 22, 2010 IETF NEA Meeting 60

Next Steps

• TBD