SlideShare une entreprise Scribd logo
1  sur  28
EAP-SIM
Using EAP-SIM for WLAN
Authentication
yliqiang@gmail.com
2005-9-13
EAP-SIM

1
Definition( 定义 )
• EAP-SIM is an Extensible Authentication
Protocol (EAP) [RFC3748] mechanism for
authentication and session key
distribution using the Global System for
Mobile communications (GSM)
Subscriber Identity Module (SIM).
用 GSM-SIM 卡作为 EAP 的认证和密匙
分发机制
EAP-SIM

2
EAP Introduction ( 简介 )
• EAP is an authentication framework which
supports multiple authentication methods.
支持多种认证机制的认证框架。
• EAP typically runs directly over data link
layers such as Point-to-Point Protocol (PPP)
or IEEE 802
EAP 通常直接运行在数据链路层如 PPP 或
IEEE 802
EAP-SIM

3
EAP Introduction ( 简介 )
• EAP permits the use of a backend
authentication server,with the authenticator
acting as a pass-through for some or all
methods and peers.
EAP 允许使用后台认证服务器,把认证端作为
一些或全部认证机制的转发者。
• Conceptually, EAP implementations consist
of the following components:
从概念上讲, EAP 的实现有下面这些组件构
成。
EAP-SIM
4
EAP-MD5

EAP-TLS

EAP-SIM

...

EAP-MD5

EAP-TLS

EAP-SIM

EAP Peer

EAP Auth.

EAP Layer

EAP Layer

IEEE 802.1X EAPOL
IEEE Logical Link
802.1X EAPOL
802.2
PPP

...

IP

802.3 802.4 802.5
802.6 802.11 ...

802.2 Logical Link

Lower Layer

Peer( 被认证者 )

EAP-SIM

PPP

802.3 802.4 802.5
802.6 802.11 ...

IP

Authenticator ( 认证
者)

5
EAP-MD5

EAP-TLS

EAP-SIM

...

EAP Peer

EAP Auth.

EAP Auth.

EAP Layer

EAP Layer

EAP Layer

IEEE 802.1X EAPOL
IEEE Logical Link
802.1X EAPOL
802.2
PPP

IP

802.3 802.4 802.5
802.6 802.11 ...

Peer( 被认证者 )

( 认证服务器 )
AAA:Authentication( 认
证) , Authorization ( 授
权 ), and Accounting ( 记
帐)

IP

802.3 802.4 802.5
802.6 802.11 ...

AAA/IP

Pass-through Authenticator ( 认证
者)

EAP-MD5 EAP-TLS

EAP-SIM

Radius Protocol

Authentication
Server

PPP
Lower Layer

802.2 Logical
Link

...

EAP Auth.
EAP Layer
AAA/IP

EAP-SIM

6
GSM authentication( 认证 )
RAND

SIM

Base Station

Ki
A3/A8

SRES
Kc

• RAND is a 128-bit random challenge issued from the base
station to the mobile.
RAND 是基站发给移动台 ( 手机 ) 的 128 比特长随机
数。
• SRES is a 32-bit response generated by A3 issued from the
mobile to the base station
SRES 是移动台 ( 手机 ) 发给基站的 32 比特长响应 , 由
A3 生成。
EAP-SIM
7
GSM authentication( 认证 )
• Kc is a 64-bit Cipher Key, used for A5.
Kc 是 64 比特长密匙,由 A8 生成用于数据加密
(A5) 。
• Ki is the SIM’s 128-bit individual subscriber key.
Ki 是 128 比特长 SIM 卡的密匙 ( 拥有标识 ) 。
• A3/A8 are specified by each operator rather than being
fully standardized,but usually implemented together as
COMP128.
A3/A8 定义了算法的输入输出,具体实现由厂商决定
EAP-SIM
8
,实际上厂商都采用了 COMP128 ,它同时实现了
EAP-SIM Introduction( 简介 )
Peer

Authenticator

AAA/RADIUS

SS7 Network

GSM/MAP/SS7
Gateway

SIM
Card

GSM Authentication
Center

• builds on underlying GSM mechanisms
构建在 GSM 认证机制之上。
EAP-SIM

9
EAP-SIM Introduction( 简介 )
• Provides mutual authentication
支持相互认证。
• several RAND challenges are used for
generating several 64-bit Kc keys, which
are combined to constitute stronger keying
material.
多次挑战生成多个 Kc, 组合起来生成更
强的相关密匙。
EAP-SIM

10
EAP-SIM Introduction( 简介 )
• EAP-SIM specifies optional support for
protecting the privacy of subscriber identity
using the same concept as GSM, which is
using pseudonyms/temporary identifiers.
EAP-SIM 支持用户身份保密 ( 可选 ) 。
• It also specifies an optional fast reauthentication procedure.
支持快速重复认证 ( 可选 )
EAP-SIM

11
EAP-SIM Full
Authentication
Procedure(

EAP-SIM

|

程完
)

Peer
Authenticator
|
EAP-Request/Identity
|
|<---------------------------------------------------------|
|
|
| EAP-Response/Identity
|
|--------------------------------------------------------->|
|
|
|
EAP-Request/SIM/Start (AT_VERSION_LIST) |
|<---------------------------------------------------------|
|
|
| EAP-Response/SIM/Start (AT_NONCE_MT,
AT_SELECTED_VERSION)|
|--------------------------------------------------------->|
|
|
|
EAP-Request/SIM/Challenge (AT_RAND, AT_MAC)
|<---------------------------------------------------------|
+-------------------------------------+
|
| Peer runs GSM algorithms, verifies |
|
| AT_MAC and derives session keys |
|
+-------------------------------------+
|
| EAP-Response/SIM/Challenge (AT_MAC)
|
|--------------------------------------------------------->|
|
|
|
EAP-Success |
|<---------------------------------------------------------|
|
|

全
认
证
过

12
Key Generation
•
•
•
•

MK = SHA1(Identity|n*Kc| NONCE_MT| Version List| Selected Version)
K_aut , K_encr , MSK and EMSK are derived from MK using Pseudo-Random number
Function (PRF)
Request AT_MAC = HMAC-SHA1-128(K_aut, EAP packet| NONCE_MT)
Response AT_MAC = HMAC-SHA1-128(K_aut,EAP packet| n*SRES)

In the formula above, the "|" character denotes concatenation.
Nonce
A value that is used at most once or that is never repeated within the
same cryptographic context.
MAC
Message Authentication Code

EAP-SIM

13
Indication of vulnerabilities( 弱
点)
• The security of the A3 and A8 algorithms is
important to the security of EAP-SIM.
Some A3/A8 algorithms have been compromised; see for example [GSM
Cloning] for discussion about the security of COMP-128 version 1. Note that
several revised versions of the COMP-128 A3/A8 algorithm have been
devised after the publication of these weaknesses and that the publicly
specified GSM-MILENAGE [3GPP TS 55.205] algorithm is not vulnerable
to any known attacks.
A3/A8 算法的安全性对 EAP-SIM 是至关重要的。 COMP128-v1 已经被破
解 ( 当前市面上大部分 SIM 卡用的是 COMP128-v1), 修订过的 COMP128
v2,v3 以及公开标准的 GSM-MILENAGE, 当前还没有方法攻破。

EAP-SIM

14
Indication of vulnerabilities( 弱
点)
• Mutual Authentication and Triplet Exposure
EAP-SIM provides mutual authentication. The peer believes that the network
is authentic because the network can calculate a correct AT_MAC value in the
EAP-Request/SIM/Challenge packet. To calculate the AT_MAC it is
sufficient to know the RAND and Kc values from the GSM triplets (RAND,
SRES, Kc) used in the authentication. Because the network selects the
RAND challenges and the triplets, an attacker that knows n (2 or 3) GSM
triplets for the subscriber is able to impersonate a valid network to the peer.
EAP-SIM 支持双向认证。被认证者相信认证者是因为认证者能计算出正
确的 AT_MAC, 要计算 AT_MAC 知道 RAND 和 Kc 就足够了。因为是认
证者选择 RAND ,攻击者只需知道几个 (2-3)Kc 就可以假装是一个有效
的认证者。

EAP-SIM

15
Security Claims( 安全声明 )
• Auth. mechanism: EAP-SIM is based on the GSM
SIM mechanism, which is a challenge/response
authentication and key agreement mechanism based
on a symmetric 128-bit pre-shared secret. EAP-SIM
also makes use of a peer challenge to provide mutual
authentication.
认证机理 :EAP-SIM 基于 GSM-SIM 的认证机理 , 它是
一种基于挑战 / 响应的认证和密匙分发机制,需要一个
预先共享的 128 比特长对称密匙 (Ki) 。 EAP-SIM 通过
被认证者发挑战 (NONCE_MT) 支持双向认证。

EAP-SIM

16
Security Claims( 安全声明 )
•
•
•
•
•
•
•
•
•
•
•
•
•
•

Ciphersuite negotiation: No
Mutual authentication: Yes
Integrity protection: Yes
Replay protection: Yes
Confidentiality: Yes, except method specific success and failure indications
Key derivation: Yes
Description of key hierarchy:(page 13)
Dictionary attack protection: N/A
Fast reconnect: Yes
Cryptographic binding: N/A
Session independence: Yes
Fragmentation: No
Channel binding: No
Indication of vulnerabilities:(page 14,15)

EAP-SIM

17
Example
Using EAP-SIM for WLAN
Authentication

EAP-SIM

18
Requirements( 需求清单 )
• Windows XP built-in supplicant
• EAP-SIM plug-in for the Windows XP built-in
802.1x Supplicant (http://weap.sf.net)
• PC/SC compatible smart card reader
(QWY LowSpeed CCID smart card reader)
• Wireless Access Point support RADIUS
(TP-LINK TL-WR541G)
• RADIUS server support EAP-SIM
(FreeRadius 1.0.4)
EAP-SIM

19
Network topological diagram
( 网络拓扑图 )
simtriplets.dat

EAP-SIM

20
SIM Reader Installation
• Download the driver from http://agsm.sf.net
• Insert the USB smart card reader in a USB
port,specify the location of the driver.
• Insert your sim-card into smart card
reader,run agsm2.exe to make sure you can
access the sim-card.

EAP-SIM

21
Configure freeradius
• Download freeradius-1.0.4 from
http://www.freeradius.org
• cd freeradius-1.0.4; Configure;make install; cd
srcmodulesrlm_sim_files; make install.
• Add the following to radiusd.conf:
In modules {}, add:
sim_files {
simtriplets = " ${raddbdir}/simtriplets.dat "
}
in eap{} add sim{}
In authorized {}, add: sim_files before eap.

• Add the following to clients.conf
client 192.168.1.0/24 {secret = eap-sim shortname= eap-sim}

EAP-SIM

22
•Run agsm2.exe.

simtriplets.dat
#IMSI

RAND

SRES

Kc

1460001551807128,52632FE305874545AC9936926D796256,8184a227,5F05b4a2C
E884400
1460001551807128,ECEB1577E275414e9DD9EF98B277E54A,00fb682e,B6c0de73
256c0400
…………

Make
sure
insert
1

EAP-SIM

Generate
simtriplets.dat

•Copy IMSI,RAND,SRES,Kc to
simtriplets.dat, at least 5 entries.

23
Configure AP

EAP-SIM

24
EAP-SIM plug-in installation
• Download wEAP-SIM from http://weap.sf.net
• Install.
• Enable tracing.
EnableConsoleTracing :
set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING
EnableConsoleTracing to nozero
set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING
wEAP-SIM EnableConsoleTracing to nozero
EnableFileTracing:
set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING
wEAP-SIM EnableFileTracing to nozero

EAP-SIM

25
Authenticate the client

EAP-SIM

26
References
• http://www.intel.com/technology/itj/2005/volume
09issue01/art07_next_generation/p05_simpl_netw
ork.htm
• draft-haverinen-pppext-eap-sim-16.txt
• [RFC3748] Extensible Authentication Protocol
(EAP)
• S5.Brumley-comp128.pdf
• [GSM Cloning]
http://www.isaac.cs.berkeley.edu/isaac/gsm.html
EAP-SIM

27
问题 & 讨论

EAP-SIM

28

Contenu connexe

Tendances

MariaDB Galera Cluster - Simple, Transparent, Highly Available
MariaDB Galera Cluster - Simple, Transparent, Highly AvailableMariaDB Galera Cluster - Simple, Transparent, Highly Available
MariaDB Galera Cluster - Simple, Transparent, Highly AvailableMariaDB Corporation
 
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;Barry Greene
 
Nmap Hacking Guide
Nmap Hacking GuideNmap Hacking Guide
Nmap Hacking GuideAryan G
 
USB Specification 2.0 - Chapter 9 - Device Framework
USB Specification 2.0 - Chapter 9 - Device FrameworkUSB Specification 2.0 - Chapter 9 - Device Framework
USB Specification 2.0 - Chapter 9 - Device FrameworkMacpaul Lin
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius ProtocolNetwax Lab
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...arnaudsoullie
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled InterruptsAnshuman Biswal
 
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Netgate
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocolssul6an14
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdfFarouk2nd
 
KASan in a Bare-Metal Hypervisor
 KASan in a Bare-Metal Hypervisor  KASan in a Bare-Metal Hypervisor
KASan in a Bare-Metal Hypervisor LF Events
 
LSA (Link State Advertisement) Types Explanation
LSA (Link State Advertisement) Types Explanation LSA (Link State Advertisement) Types Explanation
LSA (Link State Advertisement) Types Explanation NetProtocol Xpert
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPAPNIC
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at NetflixBrendan Gregg
 
Q2.12: Debugging with GDB
Q2.12: Debugging with GDBQ2.12: Debugging with GDB
Q2.12: Debugging with GDBLinaro
 
Big ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsBig ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsUtpal Sinha
 
Hedef Odaklı Subdomain Tespiti
Hedef Odaklı Subdomain TespitiHedef Odaklı Subdomain Tespiti
Hedef Odaklı Subdomain TespitiMehmetKelepce
 

Tendances (20)

MariaDB Galera Cluster - Simple, Transparent, Highly Available
MariaDB Galera Cluster - Simple, Transparent, Highly AvailableMariaDB Galera Cluster - Simple, Transparent, Highly Available
MariaDB Galera Cluster - Simple, Transparent, Highly Available
 
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;
BIND’s New Security Feature: DNSRPZ - the &quot;DNS Firewall&quot;
 
Nmap Hacking Guide
Nmap Hacking GuideNmap Hacking Guide
Nmap Hacking Guide
 
Nat pat
Nat patNat pat
Nat pat
 
USB Specification 2.0 - Chapter 9 - Device Framework
USB Specification 2.0 - Chapter 9 - Device FrameworkUSB Specification 2.0 - Chapter 9 - Device Framework
USB Specification 2.0 - Chapter 9 - Device Framework
 
Radius Protocol
Radius ProtocolRadius Protocol
Radius Protocol
 
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
Introduction to Industrial Control Systems : Pentesting PLCs 101 (BlackHat Eu...
 
Message Signaled Interrupts
Message Signaled InterruptsMessage Signaled Interrupts
Message Signaled Interrupts
 
Implementing ossec
Implementing ossecImplementing ossec
Implementing ossec
 
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018Local DNS with pfSense 2.4 - pfSense Hangout April 2018
Local DNS with pfSense 2.4 - pfSense Hangout April 2018
 
EIGRP Routing Protocols
EIGRP Routing ProtocolsEIGRP Routing Protocols
EIGRP Routing Protocols
 
Bypass_AV-EDR.pdf
Bypass_AV-EDR.pdfBypass_AV-EDR.pdf
Bypass_AV-EDR.pdf
 
KASan in a Bare-Metal Hypervisor
 KASan in a Bare-Metal Hypervisor  KASan in a Bare-Metal Hypervisor
KASan in a Bare-Metal Hypervisor
 
LSA (Link State Advertisement) Types Explanation
LSA (Link State Advertisement) Types Explanation LSA (Link State Advertisement) Types Explanation
LSA (Link State Advertisement) Types Explanation
 
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISPMake Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
Make Internet Safer with DNS Firewall - Implementation Case Study at a Major ISP
 
re:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflixre:Invent 2019 BPF Performance Analysis at Netflix
re:Invent 2019 BPF Performance Analysis at Netflix
 
gcc and friends
gcc and friendsgcc and friends
gcc and friends
 
Q2.12: Debugging with GDB
Q2.12: Debugging with GDBQ2.12: Debugging with GDB
Q2.12: Debugging with GDB
 
Big ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methodsBig ip f5 ltm load balancing methods
Big ip f5 ltm load balancing methods
 
Hedef Odaklı Subdomain Tespiti
Hedef Odaklı Subdomain TespitiHedef Odaklı Subdomain Tespiti
Hedef Odaklı Subdomain Tespiti
 

Similaire à Eap sim

Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesHannes Tschofenig
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEELinaro
 
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...Aruba, a Hewlett Packard Enterprise company
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesNRB
 
DvClub 2102 tlm based software control of uvcs for vertical verification re...
DvClub 2102   tlm based software control of uvcs for vertical verification re...DvClub 2102   tlm based software control of uvcs for vertical verification re...
DvClub 2102 tlm based software control of uvcs for vertical verification re...Amit Bhandu
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713John Yu
 
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfPaul Yang
 
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...Embarcados
 
ISTIO-Envoy-MutualTLS_v2.pptx
ISTIO-Envoy-MutualTLS_v2.pptxISTIO-Envoy-MutualTLS_v2.pptx
ISTIO-Envoy-MutualTLS_v2.pptxyingxinwang4
 
Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Eugene Sushchenko
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukIntel
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter PresentationBeny Haddad
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Hacken_Ecosystem
 
TRUMON - The Smart Transaction Surveillance
TRUMON - The Smart Transaction SurveillanceTRUMON - The Smart Transaction Surveillance
TRUMON - The Smart Transaction SurveillancePRASIMAX
 
Symantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebSymantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebCASCouncil
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networksKiran Sirupa
 

Similaire à Eap sim (20)

Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1Introduction to Diameter Protocol - Part1
Introduction to Diameter Protocol - Part1
 
WLAN and IP security
WLAN and IP securityWLAN and IP security
WLAN and IP security
 
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT DevicesMeasuring the Performance and Energy Cost of Cryptography in IoT Devices
Measuring the Performance and Energy Cost of Cryptography in IoT Devices
 
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEEBKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
BKK16-110 A Gentle Introduction to Trusted Execution and OP-TEE
 
HSM Basic Training
HSM Basic TrainingHSM Basic Training
HSM Basic Training
 
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
The Aruba Tech Support Top 10: WLAN design, configuration and troubleshooting...
 
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc DareesThe Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
The Mainframe's Role in Enterprise Security Management - Jean-Marc Darees
 
DvClub 2102 tlm based software control of uvcs for vertical verification re...
DvClub 2102   tlm based software control of uvcs for vertical verification re...DvClub 2102   tlm based software control of uvcs for vertical verification re...
DvClub 2102 tlm based software control of uvcs for vertical verification re...
 
802.1x
802.1x802.1x
802.1x
 
Deployment guide c07_554713
Deployment guide c07_554713Deployment guide c07_554713
Deployment guide c07_554713
 
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdfBuilding PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
Building PoC ready ODM Platforms with Arm SystemReady v5.2.pdf
 
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
Webinar: Plataforma Renesas Synergy – Construindo sua aplicação MQTT com anal...
 
ISTIO-Envoy-MutualTLS_v2.pptx
ISTIO-Envoy-MutualTLS_v2.pptxISTIO-Envoy-MutualTLS_v2.pptx
ISTIO-Envoy-MutualTLS_v2.pptx
 
Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7Pay Shield9000 Vs Hsm8000 Compet V7
Pay Shield9000 Vs Hsm8000 Compet V7
 
DPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii TkachukDPDK IPSec performance benchmark ~ Georgii Tkachuk
DPDK IPSec performance benchmark ~ Georgii Tkachuk
 
Diameter Presentation
Diameter PresentationDiameter Presentation
Diameter Presentation
 
Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?Dima kovalenko - Is ARMv8.3 the end of ROP?
Dima kovalenko - Is ARMv8.3 the end of ROP?
 
TRUMON - The Smart Transaction Surveillance
TRUMON - The Smart Transaction SurveillanceTRUMON - The Smart Transaction Surveillance
TRUMON - The Smart Transaction Surveillance
 
Symantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the WebSymantec’s View of the Current State of ECDSA on the Web
Symantec’s View of the Current State of ECDSA on the Web
 
Nfd18 anuta-networks
Nfd18 anuta-networksNfd18 anuta-networks
Nfd18 anuta-networks
 

Dernier

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsNathaniel Shimoni
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Farhan Tariq
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPathCommunity
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...Wes McKinney
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Mark Goldstein
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxLoriGlavin3
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integrationmarketing932765
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI AgeCprime
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsRavi Sanghani
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkPixlogix Infotech
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructureitnewsafrica
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 

Dernier (20)

Time Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directionsTime Series Foundation Models - current state and future directions
Time Series Foundation Models - current state and future directions
 
Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...Genislab builds better products and faster go-to-market with Lean project man...
Genislab builds better products and faster go-to-market with Lean project man...
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyesHow to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
How to Effectively Monitor SD-WAN and SASE Environments with ThousandEyes
 
UiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to HeroUiPath Community: Communication Mining from Zero to Hero
UiPath Community: Communication Mining from Zero to Hero
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
The Future Roadmap for the Composable Data Stack - Wes McKinney - Data Counci...
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
Arizona Broadband Policy Past, Present, and Future Presentation 3/25/24
 
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptxThe Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
The Fit for Passkeys for Employee and Consumer Sign-ins: FIDO Paris Seminar.pptx
 
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS:  6 Ways to Automate Your Data IntegrationBridging Between CAD & GIS:  6 Ways to Automate Your Data Integration
Bridging Between CAD & GIS: 6 Ways to Automate Your Data Integration
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
A Framework for Development in the AI Age
A Framework for Development in the AI AgeA Framework for Development in the AI Age
A Framework for Development in the AI Age
 
Potential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and InsightsPotential of AI (Generative AI) in Business: Learnings and Insights
Potential of AI (Generative AI) in Business: Learnings and Insights
 
React Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App FrameworkReact Native vs Ionic - The Best Mobile App Framework
React Native vs Ionic - The Best Mobile App Framework
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical InfrastructureVarsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
Varsha Sewlal- Cyber Attacks on Critical Critical Infrastructure
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 

Eap sim

  • 1. EAP-SIM Using EAP-SIM for WLAN Authentication yliqiang@gmail.com 2005-9-13 EAP-SIM 1
  • 2. Definition( 定义 ) • EAP-SIM is an Extensible Authentication Protocol (EAP) [RFC3748] mechanism for authentication and session key distribution using the Global System for Mobile communications (GSM) Subscriber Identity Module (SIM). 用 GSM-SIM 卡作为 EAP 的认证和密匙 分发机制 EAP-SIM 2
  • 3. EAP Introduction ( 简介 ) • EAP is an authentication framework which supports multiple authentication methods. 支持多种认证机制的认证框架。 • EAP typically runs directly over data link layers such as Point-to-Point Protocol (PPP) or IEEE 802 EAP 通常直接运行在数据链路层如 PPP 或 IEEE 802 EAP-SIM 3
  • 4. EAP Introduction ( 简介 ) • EAP permits the use of a backend authentication server,with the authenticator acting as a pass-through for some or all methods and peers. EAP 允许使用后台认证服务器,把认证端作为 一些或全部认证机制的转发者。 • Conceptually, EAP implementations consist of the following components: 从概念上讲, EAP 的实现有下面这些组件构 成。 EAP-SIM 4
  • 5. EAP-MD5 EAP-TLS EAP-SIM ... EAP-MD5 EAP-TLS EAP-SIM EAP Peer EAP Auth. EAP Layer EAP Layer IEEE 802.1X EAPOL IEEE Logical Link 802.1X EAPOL 802.2 PPP ... IP 802.3 802.4 802.5 802.6 802.11 ... 802.2 Logical Link Lower Layer Peer( 被认证者 ) EAP-SIM PPP 802.3 802.4 802.5 802.6 802.11 ... IP Authenticator ( 认证 者) 5
  • 6. EAP-MD5 EAP-TLS EAP-SIM ... EAP Peer EAP Auth. EAP Auth. EAP Layer EAP Layer EAP Layer IEEE 802.1X EAPOL IEEE Logical Link 802.1X EAPOL 802.2 PPP IP 802.3 802.4 802.5 802.6 802.11 ... Peer( 被认证者 ) ( 认证服务器 ) AAA:Authentication( 认 证) , Authorization ( 授 权 ), and Accounting ( 记 帐) IP 802.3 802.4 802.5 802.6 802.11 ... AAA/IP Pass-through Authenticator ( 认证 者) EAP-MD5 EAP-TLS EAP-SIM Radius Protocol Authentication Server PPP Lower Layer 802.2 Logical Link ... EAP Auth. EAP Layer AAA/IP EAP-SIM 6
  • 7. GSM authentication( 认证 ) RAND SIM Base Station Ki A3/A8 SRES Kc • RAND is a 128-bit random challenge issued from the base station to the mobile. RAND 是基站发给移动台 ( 手机 ) 的 128 比特长随机 数。 • SRES is a 32-bit response generated by A3 issued from the mobile to the base station SRES 是移动台 ( 手机 ) 发给基站的 32 比特长响应 , 由 A3 生成。 EAP-SIM 7
  • 8. GSM authentication( 认证 ) • Kc is a 64-bit Cipher Key, used for A5. Kc 是 64 比特长密匙,由 A8 生成用于数据加密 (A5) 。 • Ki is the SIM’s 128-bit individual subscriber key. Ki 是 128 比特长 SIM 卡的密匙 ( 拥有标识 ) 。 • A3/A8 are specified by each operator rather than being fully standardized,but usually implemented together as COMP128. A3/A8 定义了算法的输入输出,具体实现由厂商决定 EAP-SIM 8 ,实际上厂商都采用了 COMP128 ,它同时实现了
  • 9. EAP-SIM Introduction( 简介 ) Peer Authenticator AAA/RADIUS SS7 Network GSM/MAP/SS7 Gateway SIM Card GSM Authentication Center • builds on underlying GSM mechanisms 构建在 GSM 认证机制之上。 EAP-SIM 9
  • 10. EAP-SIM Introduction( 简介 ) • Provides mutual authentication 支持相互认证。 • several RAND challenges are used for generating several 64-bit Kc keys, which are combined to constitute stronger keying material. 多次挑战生成多个 Kc, 组合起来生成更 强的相关密匙。 EAP-SIM 10
  • 11. EAP-SIM Introduction( 简介 ) • EAP-SIM specifies optional support for protecting the privacy of subscriber identity using the same concept as GSM, which is using pseudonyms/temporary identifiers. EAP-SIM 支持用户身份保密 ( 可选 ) 。 • It also specifies an optional fast reauthentication procedure. 支持快速重复认证 ( 可选 ) EAP-SIM 11
  • 12. EAP-SIM Full Authentication Procedure( EAP-SIM | 程完 ) Peer Authenticator | EAP-Request/Identity | |<---------------------------------------------------------| | | | EAP-Response/Identity | |--------------------------------------------------------->| | | | EAP-Request/SIM/Start (AT_VERSION_LIST) | |<---------------------------------------------------------| | | | EAP-Response/SIM/Start (AT_NONCE_MT, AT_SELECTED_VERSION)| |--------------------------------------------------------->| | | | EAP-Request/SIM/Challenge (AT_RAND, AT_MAC) |<---------------------------------------------------------| +-------------------------------------+ | | Peer runs GSM algorithms, verifies | | | AT_MAC and derives session keys | | +-------------------------------------+ | | EAP-Response/SIM/Challenge (AT_MAC) | |--------------------------------------------------------->| | | | EAP-Success | |<---------------------------------------------------------| | | 全 认 证 过 12
  • 13. Key Generation • • • • MK = SHA1(Identity|n*Kc| NONCE_MT| Version List| Selected Version) K_aut , K_encr , MSK and EMSK are derived from MK using Pseudo-Random number Function (PRF) Request AT_MAC = HMAC-SHA1-128(K_aut, EAP packet| NONCE_MT) Response AT_MAC = HMAC-SHA1-128(K_aut,EAP packet| n*SRES) In the formula above, the "|" character denotes concatenation. Nonce A value that is used at most once or that is never repeated within the same cryptographic context. MAC Message Authentication Code EAP-SIM 13
  • 14. Indication of vulnerabilities( 弱 点) • The security of the A3 and A8 algorithms is important to the security of EAP-SIM. Some A3/A8 algorithms have been compromised; see for example [GSM Cloning] for discussion about the security of COMP-128 version 1. Note that several revised versions of the COMP-128 A3/A8 algorithm have been devised after the publication of these weaknesses and that the publicly specified GSM-MILENAGE [3GPP TS 55.205] algorithm is not vulnerable to any known attacks. A3/A8 算法的安全性对 EAP-SIM 是至关重要的。 COMP128-v1 已经被破 解 ( 当前市面上大部分 SIM 卡用的是 COMP128-v1), 修订过的 COMP128 v2,v3 以及公开标准的 GSM-MILENAGE, 当前还没有方法攻破。 EAP-SIM 14
  • 15. Indication of vulnerabilities( 弱 点) • Mutual Authentication and Triplet Exposure EAP-SIM provides mutual authentication. The peer believes that the network is authentic because the network can calculate a correct AT_MAC value in the EAP-Request/SIM/Challenge packet. To calculate the AT_MAC it is sufficient to know the RAND and Kc values from the GSM triplets (RAND, SRES, Kc) used in the authentication. Because the network selects the RAND challenges and the triplets, an attacker that knows n (2 or 3) GSM triplets for the subscriber is able to impersonate a valid network to the peer. EAP-SIM 支持双向认证。被认证者相信认证者是因为认证者能计算出正 确的 AT_MAC, 要计算 AT_MAC 知道 RAND 和 Kc 就足够了。因为是认 证者选择 RAND ,攻击者只需知道几个 (2-3)Kc 就可以假装是一个有效 的认证者。 EAP-SIM 15
  • 16. Security Claims( 安全声明 ) • Auth. mechanism: EAP-SIM is based on the GSM SIM mechanism, which is a challenge/response authentication and key agreement mechanism based on a symmetric 128-bit pre-shared secret. EAP-SIM also makes use of a peer challenge to provide mutual authentication. 认证机理 :EAP-SIM 基于 GSM-SIM 的认证机理 , 它是 一种基于挑战 / 响应的认证和密匙分发机制,需要一个 预先共享的 128 比特长对称密匙 (Ki) 。 EAP-SIM 通过 被认证者发挑战 (NONCE_MT) 支持双向认证。 EAP-SIM 16
  • 17. Security Claims( 安全声明 ) • • • • • • • • • • • • • • Ciphersuite negotiation: No Mutual authentication: Yes Integrity protection: Yes Replay protection: Yes Confidentiality: Yes, except method specific success and failure indications Key derivation: Yes Description of key hierarchy:(page 13) Dictionary attack protection: N/A Fast reconnect: Yes Cryptographic binding: N/A Session independence: Yes Fragmentation: No Channel binding: No Indication of vulnerabilities:(page 14,15) EAP-SIM 17
  • 18. Example Using EAP-SIM for WLAN Authentication EAP-SIM 18
  • 19. Requirements( 需求清单 ) • Windows XP built-in supplicant • EAP-SIM plug-in for the Windows XP built-in 802.1x Supplicant (http://weap.sf.net) • PC/SC compatible smart card reader (QWY LowSpeed CCID smart card reader) • Wireless Access Point support RADIUS (TP-LINK TL-WR541G) • RADIUS server support EAP-SIM (FreeRadius 1.0.4) EAP-SIM 19
  • 20. Network topological diagram ( 网络拓扑图 ) simtriplets.dat EAP-SIM 20
  • 21. SIM Reader Installation • Download the driver from http://agsm.sf.net • Insert the USB smart card reader in a USB port,specify the location of the driver. • Insert your sim-card into smart card reader,run agsm2.exe to make sure you can access the sim-card. EAP-SIM 21
  • 22. Configure freeradius • Download freeradius-1.0.4 from http://www.freeradius.org • cd freeradius-1.0.4; Configure;make install; cd srcmodulesrlm_sim_files; make install. • Add the following to radiusd.conf: In modules {}, add: sim_files { simtriplets = " ${raddbdir}/simtriplets.dat " } in eap{} add sim{} In authorized {}, add: sim_files before eap. • Add the following to clients.conf client 192.168.1.0/24 {secret = eap-sim shortname= eap-sim} EAP-SIM 22
  • 25. EAP-SIM plug-in installation • Download wEAP-SIM from http://weap.sf.net • Install. • Enable tracing. EnableConsoleTracing : set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING EnableConsoleTracing to nozero set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING wEAP-SIM EnableConsoleTracing to nozero EnableFileTracing: set HKEY_LOCAL_MACHINESOFTWAREMICROSOFTTRACING wEAP-SIM EnableFileTracing to nozero EAP-SIM 25
  • 27. References • http://www.intel.com/technology/itj/2005/volume 09issue01/art07_next_generation/p05_simpl_netw ork.htm • draft-haverinen-pppext-eap-sim-16.txt • [RFC3748] Extensible Authentication Protocol (EAP) • S5.Brumley-comp128.pdf • [GSM Cloning] http://www.isaac.cs.berkeley.edu/isaac/gsm.html EAP-SIM 27

Notes de l'éditeur

  1. The EAP server MAY use the leading &quot;1&quot; as a hint to try EAP-SIM as the first authentication method during method negotiation, rather than for example EAP/AKA. The EAP-SIM server MAY propose EAP-SIM even if the leading character was not &quot;1&quot;.