Rekeying Protocol Fix Date: Authors: Month Year

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0833r2 Submission July 2008 Luke Qian etc, CiscoSlide 1 A Proposed Scaled-down Solution to A- MPDU DoS Related Comments in LB 129.
Advertisements

Doc.: IEEE /0018r0 Submission January 2010 Alexander Tolpin, Intel CorporationSlide 1 4 –Way Handshake Synchronization Issue Date:
Doc.: IEEE /0560r0 Submission May 2010 Ashish Shukla, MarvellSlide 1 TDLS TPK Handshake Date: Authors:
1 Link Layer & Network Layer Some slides are from lectures by Nick Mckeown, Ion Stoica, Frans Kaashoek, Hari Balakrishnan, and Sam Madden Prof. Dina Katabi.
Error Checking continued. Network Layers in Action Each layer in the OSI Model will add header information that pertains to that specific protocol. On.
Submission doc.: IEEE 11-10/0745r2 May 2010 Matthew Fischer, BroadcomSlide 1 MFQ MMPDU MAC Sequence Numbering Date: Authors:
1 Chapter 16 Protocols and Protocol Layering. 2 Protocol  Agreement about communication  Specifies  Format of messages (syntax)  Meaning of messages.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.:IEEE /0313r1 Submission Robert Stacey (Intel) March 12, 2010 Slide 1 Rekeying Protocol Fix Authors: Date:
Building A Network: Cost Effective Resource Sharing
Transmission Control Protocol (TCP) TCP Flow Control and Congestion Control CS 60008: Internet Architecture and Protocols Department of CSE, IIT Kharagpur.
Doc.: IEEE /2539r0 Submission September 2007 Tony Braskich, MotorolaSlide 1 Overview of an abbreviated handshake with sequential and simultaneous.
Protocols and layering Network protocols and software Layered protocol suites The OSI 7 layer model Common network design issues and solutions.
Relationship between peer link and physical link
Message Authentication Code
The Transport Layer Implementation Services Functions Protocols
Lecture (2).
By, Nirnimesh Ghose, Master of Science,
Zueyong Zhu† and J. William Atwood‡
Undetected Duplicate Frame Reception
Month Year doc.: IEEE yy/xxxxr0 May 2012
Proposed SFD Text for ai Link Setup Procedure
5. End-to-end protocols (part 1)
Switching Techniques In large networks there might be multiple paths linking sender and receiver. Information may be switched as it travels through various.
TDLS TPK Handshake Date: Authors: May 2010 May 2010
<January 2002> doc.: IEEE <02/139r0> May, 2008
Process-to-Process Delivery:
Improvements to Power Management and Future Work
Peer Power Save Mode for TDLS
TGr Architectural Entities
Beacon Protection Date: Authors: July 2018 July 2018
Beacon Protection Date: Authors: May 2018 January 2018
CCMP Nonce Construction
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
A Simplified Solution For Critical A-MPDU DoS Issues
Reducing Overhead in Active Scanning with Simulation Results
Building A Network: Cost Effective Resource Sharing
Mechanism to update current session parameters
CCMP Nonce Construction
Protocols and Protocol Layering
CID#89-Directed Multicast Service (DMS)
Block Ack Security Date: Authors: May 2008 May 2008
Group Block Acknowledgements for Multicast Traffic
Reducing Overhead in Active Scanning with Simulation Results
A Simplified Solution For Critical A-MPDU DoS Issues
Beacon Protection Date: Authors: July 2018 July 2018
Overview of Improvements to Key Holder Protocols
Beacon Protection Date: Authors: May 2018 January 2018
Overview of Improvements to Key Holder Protocols
EHT Multi-link Operation
Protocols and Protocol Layering
GCR using SYNRA for GLK Date: Authors: July 2015 Month Year
Month Year doc.: IEEE yy/xxxxr0 May 2012
Revisiting Path Switch
Considerations on post wake-up sequences
Multiple Band Operation Discussion
Error Checking continued
Review of n A-MPDU DoS Issues – Progress and Status
Use of More Data Field Date: Authors: Jan 2006 Jan 2006
Unsolicited Block ACK Extension
Traffic Filter based Wakeup Service
WPA Coordination Changes
Multiple Band Operation Discussion
Ready to transition/ Clear to transition
Discussion on Multi-band operation
July 2008 doc.: IEEE /0833r0 July 2008 A Proposed Scale-down Solution to A-MPDU DoS Related Comments in LB 129 Date: Authors: Luke.
Multi-Link Architecture and Requirement Discussion
Discussion on TESLA Based Frame Authentication
Multi-Link Architecture and Requirement Discussion
Discussion on Multi-band operation
Presentation transcript:

Rekeying Protocol Fix Date: 2010-03-12 Authors: Month Year doc.: IEEE 802.11-yy/xxxxr0 Rekeying Protocol Fix Date: 2010-03-12 Authors: John Doe, Some Company

Problem Statement (1) Key installation after M4 is not precisely defined Differences in install timing between Authenticator and Supplicant can result in packet loss

Problem Statement (2) Difference in key install times between supplicant and authenticator can result in packet loss One side transmits using new key while other side is still decrypting using old key One side transmits using old key while other side is decrypting using new key High packet loss causes Video streaming disruption TCP slow start Use of new PN sequence may be detected as replay attack Erodes the security value of statistics on potential attacks May result in disassociation

Implementation issues RSNA Key Management RSNA Key Management data data mux demux Key management control Key management control Queue & Reorder buffers Priority Queues encrypt decrypt Key management messages and control incur variable implementation delay from Queuing delays Key management/encryption engine control path architecture E.g. messaging passing vs direct write OS scheduling latencies Inline control is possible on transmit side, but doesn’t help on receive side

Protocol issues The specification is not clear on exactly when key installation occurs after Message 4 is sent or received Message 4 may be aggregated with other data frames in the same A-MPDU Does key switch-over occur mid A-MPDU? Message 4 may be retransmitted Does transmitter install after transmitting Message 4 or after message 4 is acknowledged? Block Ack may be in use; Message 4 may only be acknowledged after additional data messages have been sent

Proposed Solution Use different Key ID with each new key installation Need to increase Key ID space for unicast traffic Currently: Key ID = 0 used for unicast traffic Key ID = 1, 2, 3 used for broadcast/multicast traffic Change to: Key ID = 0, 1 to be used for unicast Key ID = 0, 1, 2, 3 to be used for broadcast/multicast At recipient distinguish key space based on receive address in packet: Unicast address  Key ID indexes pairwise key Broadcast/multicast address  Key ID indexes group key Ensure that Tx key use at sender occurs after Rx key install at recipient Previously installed key remains valid during transition Capability exchange required to ensure that both ends support the new mechanism

Rekeying procedure using 2 keys Rekeying period (several hours) 4whs 4whs 4whs 4whs 4whs time PTKSA lifetime PTKSA (Key ID = 0) PTKSA (Key ID = 0) PTKSA (Key ID = 1) PTKSA (Key ID = 1) Transition to new key PTKSA = Pairwise Transient Key Security Association Keys remain in place (for receive processing) for 2 handshake periods PTKSA lifetime is 2 handshake periods New key installation replaces old key with same Key ID Having two active keys permits a smooth, timing relaxed transition from one PTKSA to the next

Protocol Changes (1) Authenticator installs new key for Rx before sending M3 Supplicant installs new key for Rx after receiving M3 but before sending M4 Supplicant starts using new key for Tx after sending M4 Authenticator starts using new key for Tx after receiving M4 Install New Key for Rx Install New Key for Rx Start using New Key for Tx Start using New Key for Tx

Protocol Changes (2) Protocol (Authenticator) Protocol (Supplicant) Calculate key on receiving Message 2 Install new key for Rx Ensure installation prior to transmitting Message 3 Transmit Message 3 Receive Message 4 Install new key for Tx (send MPDUs using new key) Timing is relaxed; use of new key for tx occurs any time after message 4 arrives at receive antenna, allowing for software processing delays Protocol (Supplicant) Calculate new key on receiving Message 3 Ensure installation prior to transmitting Message 4 Transmit Message 4 Timing is relaxed; some data MPDUs may still be sent using old key after Message 4 is transmitted

Summary of Specification Changes Permit Key IDs 0 and 1 to be used for unicast traffic Add Extended Key ID for Unicast capability bit in RSNE Add Key ID KDE to pairwise 4-way handshake Associates generated key with a Key ID Separate installation of key for Rx from installation of key for Tx Modify description of 4-way handshake to define when installation occurs Modify MLME-SETKEYS primitive to independently install key for Rx and Tx

Conclusion Proposed solution eliminates race condition in rekeying procedure Precisely defines (with reference to message exchange) points at which new key installation occurs Maintains relaxed timing for flexibility in implementation No real-time coupling of when messages appear on-air and when key installation occurs Allows key exchange messages to be treated as data messages by lower layers