Internet DRAFT - draft-wing-opsawg-authenticating-network
draft-wing-opsawg-authenticating-network
Operations and Management Area Working Group D. Wing
Internet-Draft Citrix
Intended status: Informational T. Reddy
Expires: 10 May 2023 Nokia
6 November 2022
Asserting Wireless Network Connections Using DNS Revolvers' Identities
draft-wing-opsawg-authenticating-network-01
Abstract
This document describes how a host uses the encrypted DNS server
identity to reduce an attacker's capabilities if the attacker is
emulating a wireless network.
About This Document
This note is to be removed before publishing as an RFC.
The latest revision of this draft can be found at
https://example.com/LATEST. Status information for this document may
be found at https://datatracker.ietf.org/doc/draft-wing-opsawg-
authenticating-network/.
Discussion of this document takes place on the OPSAWG Working Group
mailing list (mailto:opsawg@ietf.org), which is archived at
https://mailarchive.ietf.org/arch/browse/opsawg/. Subscribe at
https://www.ietf.org/mailman/listinfo/opsawg/.
Source for this draft and an issue tracker can be found at
https://github.com/danwing/authenticating-network.
Status of This Memo
This Internet-Draft is submitted in full conformance with the
provisions of BCP 78 and BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF). Note that other groups may also distribute
working documents as Internet-Drafts. The list of current Internet-
Drafts is at https://datatracker.ietf.org/drafts/current/.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
Wing & Reddy Expires 10 May 2023 [Page 1]
Internet-Draft Resolver-based Network Identity November 2022
This Internet-Draft will expire on 10 May 2023.
Copyright Notice
Copyright (c) 2022 IETF Trust and the persons identified as the
document authors. All rights reserved.
This document is subject to BCP 78 and the IETF Trust's Legal
Provisions Relating to IETF Documents (https://trustee.ietf.org/
license-info) in effect on the date of publication of this document.
Please review these documents carefully, as they describe your rights
and restrictions with respect to this document. Code Components
extracted from this document must include Revised BSD License text as
described in Section 4.e of the Trust Legal Provisions and are
provided without warranty as described in the Revised BSD License.
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 2
2. Conventions and Definitions . . . . . . . . . . . . . . . . . 3
3. Theory of Operation . . . . . . . . . . . . . . . . . . . . . 4
4. Avoiding Trust on First Use . . . . . . . . . . . . . . . . . 6
5. Security Considerations . . . . . . . . . . . . . . . . . . . 7
6. IANA Considerations . . . . . . . . . . . . . . . . . . . . . 7
7. References . . . . . . . . . . . . . . . . . . . . . . . . . 7
7.1. Normative References . . . . . . . . . . . . . . . . . . 7
7.2. Informative References . . . . . . . . . . . . . . . . . 8
Appendix A. Extending WiFi QR Code . . . . . . . . . . . . . . . 10
Acknowledgments . . . . . . . . . . . . . . . . . . . . . . . . . 10
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . . . 10
1. Introduction
When a user connects to a wireless network the user or their device
want to be sure the connection is to the expected network, as
different networks provide different services in terms of
performance, security, access to split-horizon DNS servers, and so
on. Although 802.1X provides layer 2 security for both Ethernet and
Wi-Fi networks, 802.1X is not widely deployed -- and often
applications are unaware if the underlying network was protected with
802.1X.
An attacker can operate a rogue WLAN access point with the same SSID
and WPA-PSK as a victim's network [Evil-Twin]. Also, there are many
deployments (for example, coffee shops and bars) that offer free Wi-
Fi connectivity as a customer incentive. Since these businesses are
not Internet service providers, they are often unwilling and/or
unqualified to perform advanced (sometimes, complex) configuration on
Wing & Reddy Expires 10 May 2023 [Page 2]
Internet-Draft Resolver-based Network Identity November 2022
their network. In addition, customers are generally unwilling to do
complicated provisioning on their devices just to obtain free Wi-Fi.
This leads to a popular deployment technique -- a network protected
using a shared and public Pre-Shared Key (PSK) that is printed on a
sandwich board at the entrance, on a chalkboard on the wall or on a
menu. The PSK is used in a cryptographic handshake, defined in
[IEEE802.11], called the "4-way handshake" to prove knowledge of the
PSK and derive traffic encryption keys for bulk wireless data. The
same deployement technique is typically used in residential or small
office/home office networks. If the PSK for the wireless
authentication is the same for all devices that connect to the same
WLAN, the shared key will be available to all nodes, including
attackers, so it is possible to mount an active on-path attack.
This document describes how a wireless client can utilize network-
advertised encrypted DNS servers to ensure that the attacker has no
more visibility to the client's DNS traffic than the legitimate
network. In cases where the local network provides its own encrypted
DNS server, the client can even ensure it has re-connected to the
same network, offering the client enough information to positively
detect a significant change in the encrypted DNS server configuration
-- a strong indicator of an attacker operating the network.
The proposed mechanism is also useful in deployments using
Opportunistic Wireless Encryption [RFC8110] and in LTE/5G mobile
networks where the long-term key in the SIM card on the UE can be
compromised (Section 1 of [AKA]).
The theory of operation is described mainly from the perspective of a
host that connects to a network. Further interactions may be
considered to seek for specific actions from a user (e.g., consent,
validation). Whether and how such interactions are supported is
implementation-specific and are, as such, out of scope.
The document assumes that the host supports at least one encrypted
DNS scheme (e.g., DNS over TLS or DNS over HTTPS).
The current version of the specification focuses on wirless networks.
The applicability to other network types may be assessed in future
versions.
2. Conventions and Definitions
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "NOT RECOMMENDED", "MAY", and
"OPTIONAL" in this document are to be interpreted as described in
BCP 14 [RFC2119] [RFC8174] when, and only when, they appear in all
capitals, as shown here.
Wing & Reddy Expires 10 May 2023 [Page 3]
Internet-Draft Resolver-based Network Identity November 2022
3. Theory of Operation
A host connects to a network and obtains network-related information
via DHCPv4, DHCPv6, or RA. The network indicates its encrypted DNS
server using either [DNR] or [DDR]. If the host supports an
encrypted DNS scheme that is advertised by the network, the host then
connects to at least one of the designated encrypted DNS servers,
completes the TLS handshake, and performs public key validation of
the presented certificate following conventional procedures.
The host can associate the network name with the encrypted DNS
server's identity that was learned via [DNR] or [DDR]. The type of
the network name is dependent on the access technology to which the
host is attached. For networks based on IEEE 802.11, the network
name will be the SSID of the network and the PSK. The PSK is used
along with SSID to uniquely identify the network to deal with common
Wi-Fi names such as "Airport WiFi" or "Hotel WiFi" or "Guest" but are
distinct networks with different PSK. The combination of SSID and
PSK is useful in deployments where the same Wi-Fi name is used in
many locations around the world, such as branch offices of a
corporation. It is also useful in Wi-Fi deployments that have
multiple Basic Service Set Identifiers (BSSIDs) where 802.11r
coordinates session keys amongst access points. However, in
deployments using Opportunistic Wireless Encryption, the network name
will be the SSID of the network and BSSID. For 3GPP access-based
networks, it is the Public Land-based Mobile Network (PLMN)
Identifier of the access network, and for 3GPP2 access, the network
name is the Access-Network Identifier (see [RFC7839]).
If DDR is used for discovery, the host would have to perform verified
discovery as per Section 4.2 of [DDR] and the encrypted DNS server
identity will be the encrypted DNS server's IP address.
If DNR is used, the encrypted DNS server identity will be the
Authentication Domain Name (ADN).
If this is the first time the host connects to that encrypted DNS
server, the hosts follows [DNR] or [DDR] validation procedures, which
will authenticate and authorize that encrypted DNS server's identity.
Better authentication can be performed by verifying the encrypted DNS
server's certificate with the identity provided in an extended Wi-Fi
QR code (Appendix A), consulting a crowd-sourced database, reputation
system, or -- perhaps best -- using a matching SSID and
SubjectAltName described in Section 4.
After this step, the relationship of SSID, PSK, encrypted resolver
discovery mechanism, and SubjectAltName are stored on the host.
Wing & Reddy Expires 10 May 2023 [Page 4]
Internet-Draft Resolver-based Network Identity November 2022
For illustrative purposes, Figure 1 provides an example of the data
stored for two Wi-Fi networks, "Example WiFi 1" and "Example WiFi 2"
(showing hashed PSK),
{
"networks": [
{
"SSID": "Example WiFi 1",
"PSK-ID": 12,
"Discovery": "DNR",
"Encrypted DNS": "resolver1.example.com"
},
{
"SSID": "Example WiFi 2",
"PSK-ID": 42,
"Discovery": "DDR",
"Encrypted DNS": [
"8.8.8.8",
"1.1.1.1"
]
}
]
}
Figure 1: An Example of Data Stored for Two WiFi Networks
For illustrative purposes, Figure 2 provides an example of the data
stored for two 3GPP2 networks,
{
"networks": [
{
"realm": "ims.mnc015.mcc234.3gppnetwork.org",
"Discovery": "DNR",
"Encrypted DNS": "resolver2.example.com"
},
{
"realm": "ims.mnc016.mcc235.3gppnetwork.org",
"Discovery": "DDR",
"Encrypted DNS": [
"8.8.8.8",
"1.1.1.1"
]
}
]
}
Figure 2: An Example of Data Stored for Two 3GPP2 Networks
Wing & Reddy Expires 10 May 2023 [Page 5]
Internet-Draft Resolver-based Network Identity November 2022
If this is not the first time the host connects to this same SSID,
then the Wi-Fi network name, PSK identifier, encrypted resolver
disovery mechanism, and encrypted DNS server's identity should all
match for this re-connection. If the encrypted DNS server's identity
differs, this indicates a different network than expected -- either a
different network (that happens to also use the same SSID), change of
the network's encrypted DNS server identity, or an Evil Twin attack.
The host and/or the user can then take appropriate actions.
Additionally, in a mobile network, the UE can send the discovered
encrypted resolver's identity securely to the Mobile Core Network to
assist it in identifying compromised base stations [NIST.SP.800-187].
It complements existing techniques [TR33.809] used to identify fake
base stations.
4. Avoiding Trust on First Use
Trust on First Use can be avoided if the SSID name and DNS server's
Subject Alt Name match. Unfortunately such a constraint disallows
vanity SSID names. Also, social engineering attacks gain additional
information if the network's physical address (123-Main-
Street.example.net) or name (John-Jones.example.net) is included as
part of the SSID. Thus the only safe SSID name provides no
information to assist social engineering attacks such as a customer
number (customer-123.example.net), assuming the customer number can
safely be disclosed to neighbors. Such attacks are not a concern in
deployments where the network name purposefully includes the business
name or address (e.g., Public WiFi hotspots; 123-Main-
Street.example.com, coffee-bar.example.com).
The Extensible Authentication Protocol (EAP), defined in [RFC3748],
provides a standard mechanism for support of multiple authentication
methods. EAP-TLS [RFC5216] specifies an EAP authentication method
with certificate-based mutual authentication utilizing the TLS
handshake protocol for cryptographic algorithms and protocol version
negotiation and establishment of shared secret keying material. Many
other EAP methods such as Flexible Authentication via Secure
Tunneling (EAP- FAST) [RFC4851], Tunneled Transport Layer Security
(EAP-TTLS) [RFC5281], the Tunnel Extensible Authentication Protocol
(TEAP) [RFC7170], as well as vendor-specific EAP methods such as the
Protected Extensible Authentication Protocol (PEAP) [PEAP], depend on
TLS and EAP-TLS. In networks that use the EAP-TLS method or an EAP
method that depends on TLS, if the SSID name matches one of the
subjectAltName entries in the EAP-TLS server certificate, Trust on
First Use can be avoided. It is especially useful in deployments
where the endpoint is not managed using an MDM. For instance, it can
be used during the device registration process (e.g., using Over-The-
Air (OTA) enrollment [OTA] to provision the device with a certificate
and configuration profile) or in networks (e.g., emergency services
Wing & Reddy Expires 10 May 2023 [Page 6]
Internet-Draft Resolver-based Network Identity November 2022
as discussed in Section 2.1.5 of [RFC9190]) where client
authentication is not required or in networks that use password to
authorize the client to access the network (e.g., using password
authenticated key exchange with TLS).
5. Security Considerations
The network-designated resolver may or may not be local to the
network. DDR is useful in deployments where the local network cannot
be upgraded to host a encrypted resolver and the CPE cannot be
upgraded to support DNR. For example, DDR is typically used to
discover the ISP's encrypted resolver or a public encrypted resolver.
The encrypted resolver discovered using DNR may be a public encrypted
resolver or hosted by the local network or by the ISP. The mechanism
specified in this document does not assist the client to identity if
the network-designated resolver is hosted by the local network.
However, it significantly reduces the attacker's capabilities if the
attacker is emulating a network (that is, operating a look-alike
network).
More and more content delivery networks, sensitive domains and
endpoints are migrating to TLS 1.3 and ECH. If the attacker's
network conveys the same encrypted revolver's identity as the
legitimate network, it will not have any visibility into the private
and sensitive information about the target domain. However, the
attacker's network will still have visibility into the traffic
metadata like the destination IP address, sequence of packet lengths,
inter- arrival times, etc.
The network authentication mechanism relies upon an attacker's
inability to obtain an application PKI certificate for the victim's
configured encrypted DNS server.
Neither a plain-text PSK nor hash of the PSK is necessary for the
mechanism described in this document; rather, an implementation can
use a key identifier.
6. IANA Considerations
This document has no IANA actions.
7. References
7.1. Normative References
Wing & Reddy Expires 10 May 2023 [Page 7]
Internet-Draft Resolver-based Network Identity November 2022
[DDR] Pauly, T., Kinnear, E., Wood, C. A., McManus, P., and T.
Jensen, "Discovery of Designated Resolvers", Work in
Progress, Internet-Draft, draft-ietf-add-ddr-10, 5 August
2022, <https://www.ietf.org/archive/id/draft-ietf-add-ddr-
10.txt>.
[DNR] Boucadair, M., Reddy.K, T., Wing, D., Cook, N., and T.
Jensen, "DHCP and Router Advertisement Options for the
Discovery of Network-designated Resolvers (DNR)", Work in
Progress, Internet-Draft, draft-ietf-add-dnr-13, 13 August
2022, <https://www.ietf.org/archive/id/draft-ietf-add-dnr-
13.txt>.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119,
DOI 10.17487/RFC2119, March 1997,
<https://www.rfc-editor.org/info/rfc2119>.
[RFC8174] Leiba, B., "Ambiguity of Uppercase vs Lowercase in RFC
2119 Key Words", BCP 14, RFC 8174, DOI 10.17487/RFC8174,
May 2017, <https://www.rfc-editor.org/info/rfc8174>.
7.2. Informative References
[AKA] Arkko, J., Norrman, K., Torvinen, V., and J. P. Mattsson,
"Forward Secrecy for the Extensible Authentication
Protocol Method for Authentication and Key Agreement (EAP-
AKA' FS)", Work in Progress, Internet-Draft, draft-ietf-
emu-aka-pfs-08, 23 October 2022,
<https://www.ietf.org/archive/id/draft-ietf-emu-aka-pfs-
08.txt>.
[Evil-Twin]
Wikipedia, "Evil twin (wireless networks)", June 2022,
<https://en.wikipedia.org/wiki/
Evil_twin_(wireless_networks)>.
[IEEE802.11]
Wikipedia, "IEEE802.11", August 2022,
<https://en.wikipedia.org/wiki/IEEE_802.11>.
[NIST.SP.800-187]
OTA, "Over-the-Air Profile Delivery Concepts", April 2018,
<https://developer.apple.com/library/archive/documentation
/NetworkingInternet/Conceptual/iPhoneOTAConfiguration/
OTASecurity/OTASecurity.html>.
Wing & Reddy Expires 10 May 2023 [Page 8]
Internet-Draft Resolver-based Network Identity November 2022
[RFC3748] Aboba, B., Blunk, L., Vollbrecht, J., Carlson, J., and H.
Levkowetz, Ed., "Extensible Authentication Protocol
(EAP)", RFC 3748, DOI 10.17487/RFC3748, June 2004,
<https://www.rfc-editor.org/info/rfc3748>.
[RFC4851] Cam-Winget, N., McGrew, D., Salowey, J., and H. Zhou, "The
Flexible Authentication via Secure Tunneling Extensible
Authentication Protocol Method (EAP-FAST)", RFC 4851,
DOI 10.17487/RFC4851, May 2007,
<https://www.rfc-editor.org/info/rfc4851>.
[RFC5216] Simon, D., Aboba, B., and R. Hurst, "The EAP-TLS
Authentication Protocol", RFC 5216, DOI 10.17487/RFC5216,
March 2008, <https://www.rfc-editor.org/info/rfc5216>.
[RFC5281] Funk, P. and S. Blake-Wilson, "Extensible Authentication
Protocol Tunneled Transport Layer Security Authenticated
Protocol Version 0 (EAP-TTLSv0)", RFC 5281,
DOI 10.17487/RFC5281, August 2008,
<https://www.rfc-editor.org/info/rfc5281>.
[RFC7170] Zhou, H., Cam-Winget, N., Salowey, J., and S. Hanna,
"Tunnel Extensible Authentication Protocol (TEAP) Version
1", RFC 7170, DOI 10.17487/RFC7170, May 2014,
<https://www.rfc-editor.org/info/rfc7170>.
[RFC7839] Bhandari, S., Gundavelli, S., Grayson, M., Volz, B., and
J. Korhonen, "Access-Network-Identifier Option in DHCP",
RFC 7839, DOI 10.17487/RFC7839, June 2016,
<https://www.rfc-editor.org/info/rfc7839>.
[RFC8110] Harkins, D., Ed. and W. Kumari, Ed., "Opportunistic
Wireless Encryption", RFC 8110, DOI 10.17487/RFC8110,
March 2017, <https://www.rfc-editor.org/info/rfc8110>.
[RFC8792] Watsen, K., Auerswald, E., Farrel, A., and Q. Wu,
"Handling Long Lines in Content of Internet-Drafts and
RFCs", RFC 8792, DOI 10.17487/RFC8792, June 2020,
<https://www.rfc-editor.org/info/rfc8792>.
[RFC9190] Preuß Mattsson, J. and M. Sethi, "EAP-TLS 1.3: Using the
Extensible Authentication Protocol with TLS 1.3",
RFC 9190, DOI 10.17487/RFC9190, February 2022,
<https://www.rfc-editor.org/info/rfc9190>.
Wing & Reddy Expires 10 May 2023 [Page 9]
Internet-Draft Resolver-based Network Identity November 2022
[TR33.809] 3GPP, "Study on 5G Security Enhancement against False Base
Stations", June 2022,
<https://portal.3gpp.org/desktopmodules/Specifications/
SpecificationDetails.aspx?specificationId=3539>.
Appendix A. Extending WiFi QR Code
This section is non-normative and merely explains how extending the
Wi-Fi QR code could work.
QR codes come with their own security risks, most signficant that an
attacker can place their own QR code over a legitimate QR code.
Several major smartphone operating systems support a QR code with the
following format for the SSID "example" with WPA-PSK "password",
WIFI:T:WPA;S:example;P:password;;
This could be extended to add a field containing the identity of the
encrypted DNS server. As several DNS servers can be included in the
QR code with "D:", each DNS server with its own identity using
[RFC8792] line folding,
=============== NOTE: '\' line wrapping per RFC 8792 ================
WIFI:T:WPA;S:example;P:password; \
D:ns1.example.net,D:ns.example.com;;
Acknowledgments
This document was inspired by both Paul Wouters and Tommy Pauly
during review of other documents.
Thanks to Mohamed Boucadair for the review.
Authors' Addresses
Dan Wing
Citrix
Email: danwing@gmail.com
Tirumaleswar Reddy
Nokia
Email: kondtir@gmail.com
Wing & Reddy Expires 10 May 2023 [Page 10]