802.1 AE/AF Platform considerations Ken Grewal IEEE 802.1 Plenary, November 2004

advertisement
802.1 AE/AF
Platform considerations
Ken Grewal
ken.grewal@intel.com
IEEE 802.1 Plenary, November 2004
Agenda
• Purpose
• Current Status
• Platform considerations
– Authentication
• Protocol
– Authorization
• Posture
• Policy
– Frame Format
• Other Considerations
• Conclusion
Purpose
• Clarify existing architecture, use cases,
motives
• Introduce platform considerations
• Next steps…
Current Status
• 802.1AE Stable, but frozen until AF
maturity
• 802.1AF concept stage
• Device Identity definition
– Not needed to complete this project
– If MK provisioned manually, no need for
device identity at all
Group based security
•
Rationale
–
–
–
•
Built on initial (undefined?) authentication
–
•
Key explosion / deployment considerations
Multicast / broadcast considerations
Others?
Likely P2P – 802.1X based / other
AE Shared symmetric key within group
–
Prone to spoofing – no data origin authenticity
•
–
–
–
•
Contrary to project PAR!
Compromising a single node can cause havoc in the CA
Node leaving the CA will force fresh master keys refresh everyone!
Acceptable if every node implements TPM (TCG/TNC) like security – unlikely!
AF Applicability to leaf nodes (platform / host)
–
Group membership = 2
•
Redundancy in KSP negotiation fields for groups
–
–
Group membership > 2
–
Alternative AF protocol (manual / P2P)
•
•
Live List, potential list, …
KC is not authentic and may be spoofed – does it matter?
Group sharing attractive administratively, but does not offer all security services in claim
–
=> Likely to be deployed with misconceptions about security offerings
AE / AF Interdependencies
• No need for tight coupling
– AE useable without AF definition – OOB keys
• Different AF (like) protocols may be mapped to
AE
– Leaf nodes Vs. core network / provider use cases
• Leaf nodes leverage P2P key derivation protocol
• Core leverages group based – if shared key acceptable
• Abstract group based architecture from AE
– Pure L2 encapsulation description
– Separate ‘context’ for environment
Platform Authentication
•
Protocol
•
•
Host has 1:1 (client-server) relationship with
infrastructure device (e.g. switch)
Mobility considerations
•
•
Single (mobile) host will support wired and wireless media
Consolidation of protocols / algorithms for ease of use /
deployment
–
•
single HW to service wired / wireless crypto requirements
Requires a P2P authentication protocol
•
E.g. 802.11i (like) or PSK with n=2
–
Simple 4-way handshake based on PMK to derive PTK
Platform Authentication
•
Posture
•
•
Authentication alone insufficient for applying policy
Need platform configuration / state to ensure platform
conformance to IT policy
•
•
•
‘posture’
Using authentication / posture, PDP can make better informed
policy decision
Posture carrier protocol – which layer?
•
•
Post authentication mechanism (over controlled port)
802.1X extension
–
•
•
802.1AB TLVs extensions?
Other?
–
•
EAPOL-Posture?
E.g. EAP extension
If posture part of overall authentication / key derivation, then
SAK can be used as a demux for policy!!!!!!!!
Platform Authentication
•
Policy
•
•
•
Result of authentication / posture evaluation
PDP conveys policy to PEP
Format?
•
•
Single status
Expanded status (specific filter rules)
•
•
Granular policy
Protocol
•
•
Extension of 802.1X (EAPOL-Success)?
Other (OOB / EAP extension)?
Data path considerations
•
Frame format consolidation (Wired / Wireless)
–
802.1AE Vs. 802.11i
•
•
Separation of media specific params from encapsulation
After all – Frame encapsulation is Frame encapsulation is
Frame encapsulation!!!!
–
•
All require Key-ID, enc, auth, PN (IV), [media specific stuff]
Algorithms
–
–
GCM Vs. CCM (assuming CCMP)
Shared HW
AE Frame Format
802.11i Frame Format
MIC is
weak,
hence
encrypted
CCMP is Similar
Other Observations
•
Aggregation
•
Hub considerations in 802.1X
•
•
•
Seen as multiple logical ports within 802.1X?
Analogous to wireless
VMs (next page)
More Observations
• VMs => Multi-core / multi-OS (vanderpool)
– Multiple identities for 802.1X to decipher
• Possibly over same Port / MAC!
– Multiple network stacks
• Single / multiple NICs
• One physical port per VM – OK
• One physical port per multiple VMs
– Proxy model at L2
– Single Linksec entity representing all VMs
– Local PEP – for VMs
• What is ‘device identity / posture’ in this context?
Conclusion
•
De-couple AE / AF
•
Remove group based constraints from AE – this is really pertinent to
usage model and could be an opaque context
Multiple AFs map to a single AE based on usage
•
•
Authentication protocol
•
Can leverage existing work
•
•
•
Create synergies between wired & wireless
–
–
–
•
802.1X / EAP
Session key may be associated with posture / privilege and transparently
used for policy
Assists in implementation: common algorithms / protocols for wired /
wireless
Inherent value in adoption
Convergence of algorithms (GCM  CCM) over AES?
Considerations of VMs for identity / authentication / authorization
Feedback?
Download