Secure Device Identity Tutorial



Similar documents
Network Authentication X Secure the Edge of the Network - Technical White Paper

12/3/08. Security in Wireless LANs and Mobile Networks. Wireless Magnifies Exposure Vulnerability. Mobility Makes it Difficult to Establish Trust

Lecture Objectives. Lecture 8 Mobile Networks: Security in Wireless LANs and Mobile Networks. Agenda. References

Opal SSDs Integrated with TPMs

TPM Key Backup and Recovery. For Trusted Platforms

Recipe for Mobile Data Security: TPM, Bitlocker, Windows Vista and Active Directory

Using BroadSAFE TM Technology 07/18/05

White paper. Testing for Wi-Fi Protected Access (WPA) in WLAN Access Points.

Cisco Wireless Security Gateway R2

National Identity Exchange Federation (NIEF) Trustmark Signing Certificate Policy. Version 1.1. February 2, 2016

Secure Network Communications FIPS Non Proprietary Security Policy

The following chart provides the breakdown of exam as to the weight of each section of the exam.

Wireless Robust Security Networks: Keeping the Bad Guys Out with i (WPA2)

A PKI For IDR Public Key Infrastructure and Number Resource Certification

Table of Contents. Cisco Wi Fi Protected Access 2 (WPA 2) Configuration Example

Security (WEP, WPA\WPA2) 19/05/2009. Giulio Rossetti Unipi

Key Management Interoperability Protocol (KMIP)

Federal PKI (FPKI) Community Transition to SHA-256 Frequently Asked Questions (FAQ)

CHOOSING THE RIGHT PORTABLE SECURITY DEVICE. A guideline to help your organization chose the Best Secure USB device

Security+ Guide to Network Security Fundamentals, Third Edition. Chapter 6. Wireless Network Security

How To Understand And Understand The Security Of A Key Infrastructure

BitLocker Drive Encryption Hardware Enhanced Data Protection. Shon Eizenhoefer, Program Manager Microsoft Corporation

McAfee Firewall Enterprise 8.2.1

The OpenEapSmartcard platform. Pr Pascal Urien ENST Paris

Windows Web Based VPN Connectivity Details & Instructions

WIRELESS LAN SECURITY FUNDAMENTALS

WIRELESS NETWORK SECURITY

Key Hopping A Security Enhancement Scheme for IEEE WEP Standards

Building Robust Security Solutions Using Layering And Independence

Strong authentication of GUI sessions over Dedicated Links. ipmg Workshop on Connectivity 25 May 2012

CS549: Cryptography and Network Security

Property Based TPM Virtualization

Overview. SSL Cryptography Overview CHAPTER 1

Remote Access VPN Solutions

Customer Whitepaper. Motion Tablet PC Security Basics. Table of Contents. Whitepaper Goals and Intended Audience...2

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

APNIC Trial of Certification of IP Addresses and ASes

Public Key Infrastructure (PKI)

CS 356 Lecture 29 Wireless Security. Spring 2013

Digital Certificates (Public Key Infrastructure) Reshma Afshar Indiana State University

Acronym Term Description

A Dynamic Extensible Authentication Protocol for Device Authentication in Transport Layer Raghavendra.K 1, G. Raghu 2, Sumith N 2

FIPS Non- Proprietary Security Policy. McAfee SIEM Cryptographic Module, Version 1.0

Release Notes. NCP Secure Entry Mac Client. 1. New Features and Enhancements. 2. Improvements / Problems Resolved. 3. Known Issues

Data Protection: From PKI to Virtualization & Cloud

Security vulnerabilities in the Internet and possible solutions

CRYPTOGRAPHY AS A SERVICE

IoT Security Concerns and Renesas Synergy Solutions

RELEASE NOTES. Table of Contents. Scope of the Document. [Latest Official] ADYTON Release corrections. ADYTON Release 2.12.

Release Notes. NCP Secure Entry Mac Client. Major Release 2.01 Build 47 May New Features and Enhancements. Tip of the Day

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Wireless Security. New Standards for Encryption and Authentication. Ann Geyer

Lightweight Security using Identity-Based Encryption Guido Appenzeller

PC Business Banking. Technical Requirements

Securing Wireless LANs with LDAP

10 Secure Electronic Transactions: Overview, Capabilities, and Current Status

Introducing etoken. What is etoken?

Alliance Key Manager Solution Brief

A Draft Framework for Designing Cryptographic Key Management Systems

Enhanced Privacy ID (EPID) Ernie Brickell and Jiangtao Li Intel Corporation

CA DLP. Release Notes for Advanced Encryption. r12.0

HIPAA Security Considerations for Broadband Fixed Wireless Access Systems White Paper

Trusted Platforms for Homeland Security

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

Keywords Cloud Storage, Error Identification, Partitioning, Cloud Storage Integrity Checking, Digital Signature Extraction, Encryption, Decryption

Cryptography and Key Management Basics

William Hery Research Professor, Computer Science and Engineering NYU-Poly

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

SBClient SSL. Ehab AbuShmais

Final Exam. IT 4823 Information Security Administration. Rescheduling Final Exams. Kerberos. Idea. Ticket

Introduction to Security and PIX Firewall

Certicom Security for Government Suppliers developing client-side products to meet the US Government FIPS security requirement

CNT Computer and Network Security Review/Wrapup

Section 1 CREDIT UNION Member Information Security Due Diligence Questionnaire

Network Security. Gaurav Naik Gus Anderson. College of Engineering. Drexel University, Philadelphia, PA. Drexel University. College of Engineering

esign Online Digital Signature Service

Security Yokogawa Users Group Conference & Exhibition Copyright Yokogawa Electric Corporation Sept. 9-11, 2014 Houston, TX - 1 -

Recommended Wireless Local Area Network Architecture

Mobile OTPK Technology for Online Digital Signatures. Dec 15, 2015

Objectives. Remote Connection Options. Teleworking. Connecting Teleworkers to the Corporate WAN. Providing Teleworker Services

MAC Web Based VPN Connectivity Details and Instructions

Wireless Technology Seminar

Understanding the Cisco VPN Client

ACER ProShield. Table of Contents

Trusted Network Connect (TNC)

Asymmetric cryptosystems fundamental problem: authentication of public keys

Chapter 2 Configuring Your Wireless Network and Security Settings

Public Key Applications & Usage A Brief Insight

Apple Corporate Certificates Certificate Policy and Certification Practice Statement. Apple Inc.

Odyssey Access Client FIPS Edition

Security Policy. Trapeze Networks

Deployment Scenarios

Introduction to Public Key Technology and the Federal PKI Infrastructure 26 February 2001

PrivateServer HSM Integration with Microsoft IIS

Transcription:

Mike Borza John Viega with Charles Qi Karen Zelenko 2005-07-18 Page 1

Agenda Secure Device Identity 100,000 foot view The 5 criteria The 10,000 foot view Related technologies Related presentations Charles Qi, Broadcom Broadsafe HSM Karen Zelenko Phoenix Technologies security modules 2005-07-18 Page 2

The 100,000 Foot View 2005-07-18 Page 3

What is it? Unique per-device identifiers Method or methods for authenticating that the device is uniquely bound to that identifier Manufacturing ID may be augmented with Locally Significant Identity (LSID) What is a device? Anything with an identity Norm Finn Distributed trust model, no central registry no extra administration or cost within IEEE to implement 2005-07-18 Page 4

Why is it needed? No standard ways to identify devices across network architectures MAC addresses are not sufficient Multiple per device Reconfigurable Not cryptographically bound Device identity is important for completing chains of trust Closes a significant window of vulnerability 2005-07-18 Page 5

Where will it be used? Network equipment provisioning Identification of devices joining a network Authenticated key exchange in other protocols E.g., 802.1AF, 802.1X Inventory management Internal component identification LLDP chassis IDs 2005-07-18 Page 6

The 5 Criteria 2005-07-18 Page 7

1 Broad Market Potential Potentially applicable in any 802 protocol also applicable to non-802 network protocols Specifically motivated by 802.1AE/AF need to authenticate network nodes By intent, will be light and robust enough to implement in a vast range of network devices across the cost spectrum 2005-07-18 Page 8

2 Compatibility Will maintain compatibility with 802 Overview and Architecture 802.1D, 802.1Q, 802.1f Managed objects consistent with 802.1 practice 2005-07-18 Page 9

3 Distinct Identity No existing 802 standard provides this capability across different network architectures A single framework will be defined The standard will be self-contained and complete 2005-07-18 Page 10

4 Technical Feasibility Existing identity modules provide a proof-offeasibility for the technology No unknown functionality is envisaged to complete development of this standard 2005-07-18 Page 11

5 Economic Feasibility The envisaged solution adds a small amount of cost to the devices and equipment that incorporates it There are potential savings on operations and asset management that may offset these costs Secure Device ID enabled devices may be deployed incrementally in existing networks 2005-07-18 Page 12

The 10,000 Foot View 2005-07-18 Page 13

How are Identities used today? During provisioning to associate subscriber data for a network service with devices they use for access During network connection establishment to authenticate devices attaching themselves to the network usually to authenticate the network to its subscribers sometimes (but should be always!) to limit exposure of the network to attacks from unauthorized users During connection teardown to protect users from attacks that try to force a disconnect 2005-07-18 Page 14

What is being identified? There has been a tendency to be less than precise a port is associated with equipment it is installed in... is associated with users of that equipment this has sometimes been implicit in the use of the identity, not actually intended For DevID purposes in 802 networks, an identity could be associated with any network device e.g. port, bridge blade, chassis, network host devices may be physical or virtualized, e.g. ports in MultiAccess MACsec, virtual machines recall, devices are uniquely distinguishable globally unique device identities in multi-port systems can be derived from this DevID many ports could possibly be bound to a single device ID 2005-07-18 Page 15

Device ID Chain of Trust Creators of Device IDs must have access to a PKI There is no central root for this PKI, instead many PKIs frees manufacturers to deploy device ID on their own schedule Service operators, enterprises that use Locally Significant IDs must likewise have access to a PKI 2005-07-18 Page 16

Probable Implementation Technologies KISS objective will be to define a single cryptographic binding object no optional cryptographic operators possibly single required strength for any operator Asymmetric cryptography RSA most likely most broadly deployed at present, offers greatest level of reuse but not the lightest operator to implement Hash operator (HMAC)SHA-n AES if necessary, e.g. for key wrapping X-509 certs ugly, but they work and are everywhere 2005-07-18 Page 17

Other considerations A complete standard must also deal with initial creation of manufacturer and LSIDs includes in-house, out-source and ODM issues allowed uses storage requirements for sensitive data end-of-life issues credential destruction and/or revocation credential re-issue use of devices following credential re-issue 2005-07-18 Page 18

Related Technologies 2005-07-18 Page 19

Why do we care? Leverage the work of others where we can use what's successful where we can avoid what didn't work or was broken Provide compatibility across a variety of network types Backwards compatibility with existing hardware where possible 2005-07-18 Page 20

802.11i Wireless LAN It punts! Establishment of identity occurs during authentication using 802.1X with unspecified EAP method RSN (robust secure networks) only alternatively through pre-shared keys Implementors define both the identity objects and methods that pertain to them Typically multiple implementations are installed in a single end station if multiple services are accessed through different access points 2005-07-18 Page 21

802.16 Broadband Wireless PKMv1 in Rev. 2004 supported only one-sided strong identification stations are authenticated to the network no corresponding authentication of the network ==> rogue basestations can hijack users PKMv2 in Rev. E mutual authentication based on X.509 certificates includes key negotiation algorithms during connection establishment 2005-07-18 Page 22

802.16 X.509 Cert Format Manufacturer or network operator installs prior to provisioning for security, critical parts should be stored in protected NV storage 1024 or 2048 bit RSA used for public key algorithm slow or expensive in small hardware, esp. 2048 bit HMAC SHA-1 used in authentication schemes robust, commonly available 2005-07-18 Page 23

DOCSIS used for cable modem data services subscriber authentication also uses embedded X.509 certificates past security issues caused significant tightening of requirements for storage and use of these only manufacturers may install certs requires a PKI with authentication based on Radius cryptography: RSA-1024 for PK operations 2005-07-18 Page 24

TPM Trusted Computing Group develops standards for Trusted Platform Module (TPM) TPM engenders many credentials, incompletely... Endorsement Credential (Endorsement Key EK) unique per TPM, generated in manufacturing Platform Credential incorporates the EK public key, making it a unique identifier of the platform Identity Credential (Attestation Identity Key AIK) signed by a CA used to provide anonymous attestation 2005-07-18 Page 25

Possible approaches to DevID with TPM Use the Platform Credential as a DevID contains extra information not needed, but not necessarily prohibited Derive a DevID from the PC Derive a new credential unique to DevID, unrelated to the PC except by platform association presumably stored as a protected BLOB outside the TPM 2005-07-18 Page 26

Why not simply adopt TPM? TPM includes features well beyond what's required to meet the minimum requirements of DevID TPM in gates will be larger than desirable for the bottom tiers of devices A full (compliant) TPM implementation presupposes the existence of a PKI with both distributed certificate authorities and a trusted third party to distribute and/or authenticate AIKs 2005-07-18 Page 27

Other Presentations 2005-07-18 Page 28