20
Proving IEEE 802.11i Secure Mukund Sundararajan Joint work with Changhua He, Arnab Roy, Anupam Datta, Ante Derek, John Mitchell CS259: Security Analysis of Network Protocols, Winter 2008

Proving IEEE 802.11i Secure

  • Upload
    esma

  • View
    21

  • Download
    0

Embed Size (px)

DESCRIPTION

CS259: Security Analysis of Network Protocols, Winter 2008. Proving IEEE 802.11i Secure. Mukund Sundararajan Joint work with Changhua He, Arnab Roy, Anupam Datta, Ante Derek, John Mitchell. 802.11i Key Management. TLS: Uses Certificates, provides authentication. 4WAY Handshake: - PowerPoint PPT Presentation

Citation preview

Page 1: Proving IEEE 802.11i Secure

Proving IEEE 802.11i Secure

Mukund SundararajanJoint work with Changhua He, Arnab Roy, Anupam Datta, Ante Derek, John Mitchell

CS259: Security Analysis of Network Protocols, Winter 2008

Page 2: Proving IEEE 802.11i Secure

802.11i Key Management

TLS: Uses Certificates, provides authentication

4WAY Handshake:

Creates keys for data communication

Group key handshake: Keys for broadcast

communication

Data protection:AES based

(Shared Secret-PMK)

Laptop Access Point

Auth Server

Page 3: Proving IEEE 802.11i Secure

Properties of 802.11i Key Mgt.

Roughly• Only authorized devices can join n/w• Devices do not join rogue n/w• Peer device is alive• Keys set up for data and group

communication are fresh and secret

Page 4: Proving IEEE 802.11i Secure

Proof of 802.11i security

A Formal Proof in Protocol Composition Logic (PCL) of :

On execution of an 802.11i role, properties listed in the standard are satisfied.

Attacker model (perfect crypto)• Intercept, read, reorder, delete any

message on the n/w• Construct, send messages

Page 5: Proving IEEE 802.11i Secure

Why a Proof?

[He Mitchell] analyzed 4Way Handshake using Murphi• Found a DoS attack• But did not find any security flaws

[Mitchell Shmatikov] analyzed TLS

‘Finite’ state analysis does not guarantee security

Page 6: Proving IEEE 802.11i Secure

Model Checking does’nt Scale

Group keySupplicant

802.11i

EAP-TLS Server EAP-TLS Client

4WAY

Supplicant 4WAY

Authenticator

Group keyAuthenticator

Laptop A.P. A.S.

Page 7: Proving IEEE 802.11i Secure

TLS Server Role

receive C, S, nc, suiteC //Hello

new ns

send S, C, ns, suiteS //Resp

receive C, S, {sec}Ks , SIGC(hshk1) //Xfer

check SIGC(hshk1)

decrypt {sec}Ks

send S, C, hashsec(hshk2) //ServerView

Page 8: Proving IEEE 802.11i Secure

Security Properties of TLS

The client and the server agree on•Value of the secret •Version and crypto suite•Identities (mutual authentication)•Protocol completion status

The secret term is not known to a principal who is not the client or the server (shared secret)

Page 9: Proving IEEE 802.11i Secure

Matching Conversations

Honest(C) [TLS Server]S C.

Send ( C, Hello) Receive ( S, Hello )

Receive ( S, Hello ) Send ( S, Resp)

Send ( S, Resp) Receive( C, Resp)

Receive( C, Resp) Send ( C, KeyXfer) Send ( C, KeyXfer) Receive ( S, KeyXfer)

Receive ( S, KeyXfer) Send( S,ServerView)

Page 10: Proving IEEE 802.11i Secure

Proof Sketch

1. S sees SIGC(hshk1) concludes C constructed it

4. If honest C constructed SIGC(hshk1), then it executed actions consistent with TLS Client role

5. Order actions based on freshness of nonces

Page 11: Proving IEEE 802.11i Secure

Some Axioms Used in the Proof

Page 12: Proving IEEE 802.11i Secure

Program Invariant used in Proof

Page 13: Proving IEEE 802.11i Secure

Proof of TLS Authentication

Page 14: Proving IEEE 802.11i Secure

Matching Conversations!

Page 15: Proving IEEE 802.11i Secure

Proof Structure

Group keySupplicant

EAP-TLS Server EAP-TLS Client

4WAY

Supplicant

4WAY Authenticator

Group keyAuthenticator

Local Reasoning

Based on actions And cryptography

Program Invariants

Pre-conditions

Page 16: Proving IEEE 802.11i Secure

Protocol Insights

802.11i is secure Other modes are safe

• Using Cached PMKs and Pre-shared Keys is safe

• Safe under error handling Protocols can share certificates

with TLS as long as conditions listed in paper are satisfied

Page 17: Proving IEEE 802.11i Secure

Evolution of WLAN Security

Wired Equivalent Privacy • Incorrect use of cryptography• WEP lacks key mgt

802.11i is designed to fix these issues (June 2004)

[He Mitchell] uncovers DoS attacks Fix adopted by standards committee Security Proof of 802.11i

Page 18: Proving IEEE 802.11i Secure

Error Handling [HM05]

Stage 1: Network and Security Capability Discovery

Stage 2: 802.1X Authentication (mutual authentication, shared secret, cipher suite)

Stage 3: Secure Association (management frames protected)

Stage 4: 4-Way Handshake(PMK confirmation, PTK derivation, and GTK distribution)

Stage 5: Group Key Handshake

Stage 6: Secure Data CommunicationsMichael MIC Failure or Other Security Failures

Group Key Handshake Timeout

4-Way Handshake Timeout

Association Failure

802.1X Failure

Page 19: Proving IEEE 802.11i Secure

Interactions can cause Flaws

Exercise: Construct two protocols. Each does something reasonable. Each is secure in isolation.

But, if any principal executes both protocols, one of the two protocols is insecure.• Chosen protocol attack (Wagner et.al.)

Page 20: Proving IEEE 802.11i Secure

Thanks!