Topic #1 & #5 “All that has to do with header formats”

Slides:



Advertisements
Similar presentations
The Future of TCP/IP Always evolving: –New computer and communication technologies More powerful PCs, portables, PDAs ATM, packet-radio, fiber optic, satellite,
Advertisements

Computer Networks20-1 Chapter 20. Network Layer: Internet Protocol 20.1 Internetworking 20.2 IPv IPv6.
CE363 Data Communications & Networking Chapter 7 Network Layer: Internet Protocol.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
CS470, A.SelcukIPsec – AH & ESP1 CS 470 Introduction to Applied Cryptography Instructor: Ali Aydin Selcuk.
Umut Girit  One of the core members of the Internet Protocol Suite, the set of network protocols used for the Internet. With UDP, computer.
Source Port # (16)Destination Port # (16) Sequence Number (32 bits) Acknowledgement Number (32 bits) Hdr Len (4) Flags (6)Window Size (16) Options (if.
Oct 19, 2004CS573: Network Protocols and Standards1 IP: Datagram and Addressing Network Protocols and Standards Autumn
Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun Bob O’Hara Rohit Suri Nancy Cam Winget Scott Kelly Michael Williams Sue Hares draft-ohara-capwap-lwapp-03.txt.
Format for the Session Initiation Protocol (SIP) Common Log Format (CLF) draft-ietf-sipclf-format-01 (G. Salgueiro, V. Gurbani, and A. B. Roach) Presenter:
CAPWAP Editor’s Report Pat R. Calhoun Cisco Systems, Inc.
Introduction to Networks CS587x Lecture 1 Department of Computer Science Iowa State University.
Dr. John P. Abraham Professor UTPA
CS4550 Computer Networks II IP : internet protocol, part 2 : packet formats, routing, routing tables, ICMP read feit chapter 6.
Light Weight Access Point Protocol (LWAPP) Pat R. Calhoun draft-ohara-capwap-lwapp-01.txt.
March 2007 CAPWAP Protocol Specification Editors' Report March 2007
Internet Protocol Formats. IP (V4) Packet byte 0 byte1 byte 2 byte 3 data... – up to 65 K including heading info Version IHL Serv. Type Total Length Identifcation.
Transport-Friendly ESP Steven M. Bellovin AT&T Labs Research
March 2006 CAPWAP Protocol Specification Update March 2006
Packet Format Issues #227: Need Shim Header to indicate Crypto Property of packet Do we need to add pre-amble header to indicate if data is encrypted or.
Chapter 27 IPv6 Protocol.
Encapsulated Security Payload Header ● RFC 2406 ● Services – Confidentiality ● Plus – Connectionless integrity – Data origin authentication – Replay protection.
1 Lecture 13 IPsec Internet Protocol Security CIS CIS 5357 Network Security.
1 Computer Communication & Networks Lecture 19 Network Layer: IP and Address Mapping Waleed Ejaz.
IEEE m Headers Design Document Number: IEEE C80216m-09/0481 Date Submitted: Source: Baowei Ji Phone:
Authentication Header ● RFC 2402 ● Services – Connectionless integrity – Data origin authentication – Replay protection – As much header authentication.
July 2007 CAPWAP Protocol Specification Editors' Report July 2007
IPSEC Modes of Operation. Breno de MedeirosFlorida State University Fall 2005 IPSEC  To establish a secure IPSEC connection two nodes must execute a.
Issue EAPoL-Key message generation at WTP or AC Issue 199, summarized as:...the WTP maintains the KeyRSC while the AC requires this information to.
Network Layer Protocols COMP 3270 Computer Networks Computing Science Thompson Rivers University.
IPv4 IPv4 The Internet Protocol version 4 (IPv4) is the delivery mechanism used by the TCP/IP protocols. Datagram Fragmentation Checksum Options Topics.
20.1 Chapter 20 Network Layer: Internet Protocol Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential.
2018/4/ /4/18 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: Overview of Date Submitted:
Multiplexing.
November 2010 doc.: IEEE e Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: LB60 comment.
Topic #3 DTLS/CAPWAP Interactions
PANA Issues and Resolutions
Next Generation: Internet Protocol, Version 6 (IPv6) RFC 2460
IT443 – Network Security Administration Instructor: Bo Sheng
Carrying IPSEC Authentication and ESP Headers Across SCPS-NP Networks
Chapter 7: The Infamous IP
Guide to TCP/IP Fourth Edition
Chapter 7: The Infamous IP
Dr. John P. Abraham Professor UTPA
IP : Internet Protocol Surasak Sanguanpong
doc.: IEEE <02/139r0> <January 2002> May, 2009
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
Chapter 20 Network Layer: Internet Protocol
Dr. John P. Abraham Professor UTRGV, EDINBURG, TX
What does this packet do?
<doc.: IEEE −doc>
Issue Discussion: KeyRSC (43)
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Robert Moskowitz, Verizon
Dr. John P. Abraham Professor UTPA
Robert Moskowitz, Verizon
Net 323 D: Networks Protocols
<author>, <company>
May 2018 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Considerations on general MAC frame] Date Submitted:
Submission Title: LB Resolutions from kivinen
Measurement reporting in TGh
doc.: IEEE <doc#1>
doc.: IEEE < IETF>
<author>, <company>
doc.: IEEE < IETF>
doc.: IEEE < IETF>
IPv6 Current version of the Internet Protocol is Version 4 (v4)
Presentation transcript:

Topic #1 & #5 “All that has to do with header formats” Pat R. Calhoun

Issue 227 Problem Statement As discussed on the list, the issue is: During the initialization a session, the AC doesn’t have a simple way to differentiate CAPWAP Discovery Requests from DTLS packets Several alternatives were discussed, including: Reserving fixed fields within CAPWAP to ensure differentiation with DTLS Adding mandatory DTLS header padded with zeroes (which would signify an invalid DTLS header).

Proposed Resolution Agreed upon resolution on the list was to require a fixed header prior to DTLS header Not present in Discovery Packets DTLS Header UDP CAPWAP Pre-Header CAPWAP Header CAPWAP Payload Dictates header that follows

Proposed Resolution The group also agreed that consistency in packet formats was desirable Therefore, the pre-header was used with data packets as well Encryption (or not) would be available in the pre-header, although local policy needs to be enforced Also addresses issue 224 and 89

Proposal #1 Pre-Header format proposed by Scott Kelly: +------------+------------+------------+------------+-------- | Version | Tunnel ID | Type | Payload Version field is used to provide protocol extensibility The Tunnel ID field, which is equivalent to a DTLS Session Identifier, is used for QoS purposes (topic addressed by Mani) Type would indicate the contents of the payload field: 0x1 – Clear Text CAPWAP Control Packet 0x2 – Clear Text CAPWAP Data Packet 0x3 – DTLS Encrypted Control Packet 0x4 – DTLS Encrypted Data Packet

Proposal #1 (cont) This last proposal is a merge of both proposals one and two, which eliminates the need for a second version field: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| Tunnel ID | Type | | (optional) DTLS Header | |Version| RID | HLEN | WBID |F|L|D|W|M|T| Flags | | RID | HLEN | WBID |F|L|D|W|M|T| Flags | | Fragment ID | Frag Offset |Rsvd | | Session ID | | (optional) Radio MAC Address | | Payload .... | Issue is created because two version fields exist, and whether they have a relationship.

Proposal #2 This alternative proposal exposes part of the CAPWAP header, but only has a single Version field: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| RID | HLEN | WBID |F|L|D|W|M|T| Flags | | Fragment ID | Frag Offset |Rsvd | | Session ID | | (optional) DTLS Specific Information | | (optional) Wireless Specific Information | | (optional) Radio MAC Address | | Payload .... | Where DTLS Specific Info has the following format: | Length | Tunnel ID | DTLS Header

Proposal #3 (Pat’s Preference) This last proposal is a merge of both proposals one and two, and similar to the proposal in issue 137, which eliminates the need for a second version field: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ |Version| Tunnel ID | Type | | (optional) DTLS Header | | RID | HLEN | WBID |F|L|D|W|M|T| Flags | | Fragment ID | Frag Offset |Rsvd | | Session ID | | (optional) Radio MAC Address | | Payload .... | Type field has the same values as shown in proposal one (1) Note Issue 137 also inclusome additional document formatting requests, which are editorial in nature and not required

Issue 127: Use of SESSION ID The Session ID is necessary in order to bind the control and data plane The binding is necessary to support NAT gateways, where multiple WTPs may appear behind a single IP Address

Proposal 168 Requested the removal of the Session ID, which is needed for NAT support

Control Message Format Proposal The proposal simply removes the Time Stamp field, which has not found any usefulness (initially requested by David Perkins, yet removed in his proposals 137 and 146): 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Message Type | | Seq Num | Msg Element Length | Flags | | Time Stamp | | Msg Element [0..N] ... +-+-+-+-+-+-+-+-+-+-+-+-+ TO:

Control Message Format Proposal (partially from Issue 137) Components not adopted Introduction of Sequence Number field (which he removed in his subsequent issue 146) Introduction of reserved field (was used for padding – not required) Introduction of ‘F’ bit (first packet). This is unnecessary because both ends need to know what packets they’ve received Introduction of Length field. Unnecessary since this is derived from outer headers

Proposal 146 Introduces a separate CAPWAP Fragmentation Header which is not adopted Complicates the packet format (nothing wrong with the current proposal) Some text could be useful (mostly editorial) Additional re-ordering of fields not adopted

Proposal 217 The specification is not clear on what 802.11 fields are to be present If 802.11i encryption is provided on the AC, the frame format contains the necessary fields If 802.11i encryption terminates in the WTP, should the AC add padded fields for the necessary security? Yes, since this is how most chipsets work today TKIP would include the necessary header format The Checksum is not present since it may be removed by the 802.11 chip

Proposal 221 The CAPWAP protocol supports the use of DTLS on the data plane, but has no way to signal from AC to WTP New AC Descriptor format: 0 1 2 3 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+ | Stations | Limit | | Active WTPs | Max WTPs | | Security | R-MAC Field |Wireless Field | DTLS Policy | The DTLS Policy field supports on the following values: 0x0: DTLS does not need to be applied on the data channel 0x1: DTLS needs to be applied on the data channel

Side Issue The CAPWAP protocol does not specify a DTLS version In order to guarantee interoperability, a version MUST be mandated