Overview of Improvements to Key Holder Protocols

Slides:



Advertisements
Similar presentations
Doc.: IEEE /1186r0 Submission October 2004 Aboba and HarkinsSlide 1 PEKM (Post-EAP Key Management Protocol) Bernard Aboba, Microsoft Dan Harkins,
Advertisements

Doc.: IEEE /0836r2 Submission July 2008 Dan Harkins, Aruba NetworksSlide 1 Changes to SAE State Machine Date: Authors:
Doc.: IEEE /1267r0 Submission November 2008 L. Chu Etc.Slide 1 Multiple Radio MP Date: Authors:
Doc.: IEEE r6 Submission July 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Analysis and Improvements over DoS Attacks against IEEE i Standard Networks Security, Wireless Communications and Trusted Computing(NSWCTC), 2010.
Doc.: IEEE /770r0 Submission July 2009 Slide 1 TGs Authenticated Encryption Function Date: Authors: Russ Housley (Vigil Security), et.
Doc.: Submission, Slide 1 Project: IEEE P Working Group for Wireless Personal Area Networks (WPANs) Submission Title: [Securing the Network.
Doc.: IEEE /1625r1 Submission November 2006 Braskich, et al Slide 1 Update to Efficient Mesh Security and Link Establishment Notice: This document.
Doc.: IEEE /1572r0 Submission December 2004 Harkins and AbobaSlide 1 PEKM (Post-EAP Key Management Protocol) Dan Harkins, Trapeze Networks
Doc.: IEEE /0617r0 Submission May 2008 Tony Braskich, MotorolaSlide 1 Refining the Security Architecture Date: Authors:
Doc.: IEEE r1 Submission March 2008 Charles Fan,Amy Zhang, HuaweiSlide 1 Authentication and Key Management of MP with multiple radios Date:
Doc.: IEEE /2539r0 Submission September 2007 Tony Braskich, MotorolaSlide 1 Overview of an abbreviated handshake with sequential and simultaneous.
Doc.: IEEE /2179r0 Submission July 2007 Steve Emeott, MotorolaSlide 1 Summary of Updates to MSA Overview and MKD Functionality Text Date:
Doc.: IEEE /0103r0 Submission January 2004 Jesse Walker, Intel CorporationSlide 1 Some LB 62 Motions January 14, 2003.
History and Implementation of the IEEE 802 Security Architecture
History and Implementation of the IEEE 802 Security Architecture
FILS Reduced Neighbor Report
TGaq Transaction Protocol
Some LB 62 Motions January 13, 2003 January 2004
IEEE MEDIA INDEPENDENT HANDOVER
– Chapter 5 (B) – Using IEEE 802.1x
Motions to Address Some Letter Ballot 52 Comments
Managed Object Request/Response
Charles Clancy Katrin Hoeper IETF 73 Minneapolis, USA 17 November 2008
Overview of Key Holder Security Association Teardown Mechanism
Authentication and Key Management of MP with multiple radios
TSN Architecture Mike Moreton, STMicroelectronics
TDLS Setup Date: Authors: Mar 2008 September 2007
Mesh Security Proposal
Mesh Frame Formats Date: Authors: June 2007 March 2007
Multiple MAC addresses
Managed Object Request/Response
PEKM (Post-EAP Key Management Protocol)
TGr Architectural Entities
Mesh Frame Formats Date: Authors: July 2007 March 2007
Summary of Unresolved General Comments for 2/14 TGs Telecon
Beacon Protection Date: Authors: July 2018 July 2018
Jesse Walker and Emily Qi Intel Corporation
Summary of Updates to Abbreviated Handshake
Overview of Changes to Key Holder Frame Formats
May 2007 MSA Comment Resolution Overview
Update to Efficient Mesh Security and Link Establishment
Changes to SAE State Machine
Authentication and Key Management of MP with multiple radios
Mesh Frame Formats Date: Authors: May 2007 March 2007
Fast Roaming Compromise Proposal
Link Setup Flow July 2011 Date: Authors: Name Company
Introducing 11r-d0.00 Date: Authors: January 2002
TGr state machines: normative or informative?
Mesh Security Proposal
Different MKD domain MPs communication method
TGr Authentication Framework
Fast Roaming Compromise Proposal
Mesh Frame Formats Date: Authors: June 2007 March 2007
Beacon Protection Date: Authors: July 2018 July 2018
Client Management Protocol Details
Relationship between peer link and physical link
PLE Comment Resolution
Introducing 11r-d0.00 Date: Authors: July 2005
Overview of Improvements to Key Holder Protocols
Beacon Protection Date: Authors: May 2018 January 2018
IEEE MEDIA INDEPENDENT HANDOVER DCN: xx-00-sec
Security Requirements for an Abbreviated MSA Handshake
TGr Authentication Framework
Link Setup Flow July 2011 Date: Authors: Name Company
Mesh Frame Formats Date: Authors: May 2007 March 2007
Mesh Frame Formats Date: Authors: July 2007 March 2007
IEEE MEDIA INDEPENDENT HANDOVER
Overview of an MSA Security Proof
Mesh Frame Formats Date: Authors: May 2007 March 2007
Presentation transcript:

Overview of Improvements to Key Holder Protocols July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Overview of Improvements to Key Holder Protocols Date: 2007-06-27 Authors: Steve Emeott, Motorola Steve Emeott, Motorola

July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Abstract This submission provides an overview of document 11-07/1987r1, which proposes improvements to the key holder communications protocols defined for use in the mesh security architecture. The proposed changes are include expanded error handling features, revisions to the key holder handshake and key transport push protocol, and new MLME-SAP interface primitives. 20 comments are addressed by the proposed changes. Steve Emeott, Motorola Steve Emeott, Motorola

Outline Mesh key holder architecture July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Outline Mesh key holder architecture Improvements: Key holder communications Summary of comments received Overview of proposed changes Additional details Steve Emeott, Motorola Steve Emeott, Motorola

Mesh Key Holder Architecture July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Mesh Key Holder Architecture Mesh Key Distributor PMK-MKD-KH / Local PMK-MKD-KH PMK-MA-KH / Local PMK-MA-KH RSNA Key Management Scope of submission: improving communications between key holders Mesh Authenticator Mesh key holders are part of MP SME RSNA key management Architecture defines the keys computed by each key holder Computation of PMK-MKD, PMK-MA and MKDK Restricted to PMK-MKD-KH for peer MP keys Restricted to Local PMK-MKD-KH for local MP keys Computation of PTK-MA and MPTK-KD Restricted to PMK-MA-KH for peer MP keys Restricted to Local PMK-MA-KH for local MP keys Steve Emeott, Motorola Steve Emeott, Motorola

Key Holder Exchanges Key holder handshake Key transfer July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Key Holder Exchanges Key holder handshake Used to derive a fresh key delivery key, negotiate EAP message transport protocol to use Key transfer Pull Mode Push Mode Delete EAP message transport Used to transport EAP messages between 802.11s Authenticator and NAS Client entities when they are not co-located Steve Emeott, Motorola Steve Emeott, Motorola

July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Comments Received Questions about processing steps and status code that should be included for error handling Question about whether key holder handshake should be extended to 4 messages for better error handling Request to make key transfer protocol optional Request to identify key used to integrity protect messages Questions about message token and sequence number fields included to prevent replay attacks Steve Emeott, Motorola Steve Emeott, Motorola

July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Overview of Changes Explicitly defined processing steps and status codes for error handling in all key holder exchanges Conditions for silently discarding messages Conditions for retrying key holder handshake messages Values of status codes for indicating failures Defined MLME primitives and MIB variables Primitives defined in support of key holder architecture Also need primitives and MIB variables to define error handling Made key transport protocol optional Key transport protocol can be negotiated during key holder handshake Defined key name field to identify MIC key Steve Emeott, Motorola Steve Emeott, Motorola

Overview of Changes (cont.) July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Overview of Changes (cont.) Added 4th message to key holder handshake Permits aspirant MA to manage retries of handshake messages, enabling MKD to simply respond to messages it receives Permits negotiation of optional EAP and Key transport protocol during key holder handshake Named replay counters and replaced message token in EAP encapsulation field with replay counter Improved the key transport protocol Renamed pull mode messages to request and response Reused pull mode messages in the push mode protocol, and added 3rd message to combat delay attacks Steve Emeott, Motorola Steve Emeott, Motorola

Additional Details Mesh Key Holder Security Handshake July 2007 … SME MAC MA Multihop Action Frame MKD MAC SME MLME-MeshKeyHolderHandshake.request Handshake Msg 1 MLME-MeshKeyHolderHandshake.indication MLME-MeshKeyHolderHandshake.confirm MLME-MeshKeyHolderHandshake.request Handshake Msg 2 MLME-MeshKeyHolderHandshake.indication MLME-MeshKeyHolderHandshake.confirm … Steve Emeott, Motorola

Additional Details (cont.) July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Additional Details (cont.) Key Transport – Pull Mode SME MAC MA Multihop Action Frame MKD MAC SME MLME-MeshKeyTransport.request Request MLME-MeshKeyTransport.indication MLME-MeshKeyTransport.confirm MLME-MeshKeyTransport.request Response MLME-MeshKeyTransport.indication MLME-MeshKeyTransport.confirm Steve Emeott, Motorola Steve Emeott, Motorola

Additional Details (cont.) July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Additional Details (cont.) Key Transport – Push Mode MA MKD Multihop Action Frame SME MAC MAC SME MLME-MeshKeyTransport.request Notify MLME-MeshKeyTransport.indication MLME-MeshKeyTransport.confirm MLME-MeshKeyTransport.request Request MLME-MeshKeyTransport.indication MLME-MeshKeyTransport.confirm MLME-MeshKeyTransport.request Response MLME-MeshKeyTransport.indication MLME-MeshKeyTransport.confirm Steve Emeott, Motorola Steve Emeott, Motorola

Additional Details (cont.) July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Additional Details (cont.) EAP Transport SME MAC MA MKD Multihop Action Frame MAC SME MLME-MeshEAPTransport.request EAP Encapsulation Request MLME-MeshEAPTransport.indication MLME-MeshEAPTransport.confirm MLME-MeshEAPTransport.request EAP Encapsulation Response MLME-MeshEAPTransport.indication MLME-MeshEAPTransport.confirm Steve Emeott, Motorola Steve Emeott, Motorola

Backup July 2007 July 2007 doc.: IEEE 802.11-07/1988r1 Steve Emeott, Motorola Steve Emeott, Motorola

Review of Recent Changes July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Review of Recent Changes Highlights of improvements already made to MSA Improvements to PLM (11-07/0440r0: 106 comments) Definition of MIB variables for MSA (11-07/0436r1: 25 comments) Simplification of frame formats for key holder messages (11-07/0286r0: & 11-07/0287r1: 35 comments) Addition of AES-128-MAC MIC algorithm (11-07/0435r1: 4 comments) Upgrades to better support co-located MKD/MA (11-07/0437r1: 3 comments) Integration of PLM into MSA authentication handshake (11-07/0564r2: 16 comments) Clean up of key derivation clause (11-07/0618r0: 21 comments) Steve Emeott, Motorola Steve Emeott, Motorola

July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Work in Progress Areas where unresolved comments are still under discussion Key holder communications – document 07/1987 (20 comments) Cleanup of high level architecture description (15 comments) Pre-shared keys (8 comments) Abbreviated handshake (5 comments) Other (40 comments) Steve Emeott, Motorola Steve Emeott, Motorola

Exemplary Implementation of Initial MSA Authentication July 2007 doc.: IEEE 802.11-07/1988r1 July 2007 Exemplary Implementation of Initial MSA Authentication Authentication Server Network Access Server (AAA Client) 802.1X Authenticator (Controlled Port) 802.1X Supplicant PMK-MKD-KH PMK-MA-KH Local PMK-MKD-KH Local PMK-MA-KH Multihop Action PLM & EAPOL Radius Optionally mesh key holders may be co-located Steve Emeott, Motorola Steve Emeott, Motorola