WPA Coordination Changes

Slides:



Advertisements
Similar presentations
Doc.: IEEE /684R2 Submission November 2002 Martin Lefkowitz, Trapeze NetworksSlide 1 Extended Keymap ID Martin Lefkowitz Trapeze Networks.
Advertisements

Doc.: IEEE /2441r2 Submission SA Teardown Protection for w Date:
Doc.: IEEE /0560r0 Submission May 2010 Ashish Shukla, MarvellSlide 1 TDLS TPK Handshake Date: Authors:
Doc.: IEEE /0509r3 Submission Proposed Resolution to CID 72, 119 and 128 Qian ChenSlide 1 May 2014 Date:
WiFi Security. What is WiFi ? Originally, Wi-Fi was a marketing term. The Wi-Fi certified logo means that the product has passed interoperability tests.
WPA2 By Winway Pang. Overview  What is WPA2?  Wi-Fi Protected Access 2  Introduced September 2004  Two Versions  Enterprise – Server Authentication.
Doc.: IEEE /1206r0 Submission Oct 2004 Black, NokiaSlide 1 TGk LB71 Parallel category comment resolution Simon Black (Nokia)
Doc.: IEEE /296r1 SubmissionMitch Buchman May 2001 Slide 1 TGi Draft 1Clause Comments IEEE P802.11E Security/D1.0 Letter Ballot# 25.
Doc.: IEEE /0485r0 Submission May 2004 Jesse Walker and Emily Qi, Intel CorporationSlide 1 Management Protection Jesse Walker and Emily Qi Intel.
SubmissionJoe Kwak, InterDigital1 Simplified 11k Security Joe Kwak InterDigital Communications Corporation doc: IEEE /552r0May 2004.
Doc.: IEEE /0467r1 Submission May 2005 Richard Paine, BoeingSlide 1 11k LB73 Security Resolutions Notice: This document has been prepared to assist.
Doc.: IEEE /552r0 Submission July 2003 Jon Edney, NokiaSlide 1 Protection of Action Frames Jon Edney Nokia
History and Implementation of the IEEE 802 Security Architecture
1 /24 May Systems Architecture WPA / WPA 2(802.11i) Burghard Güther, Tim Hartmann
Module 48 (Wireless Hacking)
History and Implementation of the IEEE 802 Security Architecture
AP Architecture Changes Mike Moreton, STMicroelectronics
WEP & WPA Mandy Kershishnik.
January 2003 Joe Kwak InterDigital Communications Corporation
P802.11aq Waiver request regarding IEEE RAC comments
Keying for Fast Roaming
doc.: IEEE /xxxr0 Mike Moreton
TGi Motions for Comment Resolution
Wireless LAN Security 4.3 Wireless LAN Security.
Motions to Address Some Letter Ballot 52 Comments
TSN Architecture Mike Moreton, STMicroelectronics
TDLS TPK Handshake Date: Authors: May 2010 May 2010
IGTK Switch Announcement
Nancy Cam-Winget, Cisco Systems Inc
IEEE i Dohwan Kim.
Wireless Network Security
Multicast Replay Detection Fred Stivers, Texas Instruments
IGTK Switch Announcement
Partial Proposal to TGw - AMID
Broadcast and Unicast Management Protection (BUMP)
Stefan Rommer, Mats Näslund, András Méhes (Ericsson)
Broadcast and Unicast Management Protection (BUMP)
QoS Resource Query Overview
July 2002 Threat Model Tim Moore Tim Moore, Microsoft.
Secure Enablement and CVS without Persistent Association
Nancy Cam-Winget, Cisco Systems Inc
Pre-Authentication Authentication of Management Frames
Multicast Replay Detection Fred Stivers, Texas Instruments
Multicast Replay Detection Fred Stivers, Texas Instruments
Security for Measurement Requests and Information
TKIP.
AES Associated Data Optimization
Overview of Changes to Key Holder Frame Formats
TGi Preliminary Agenda
AP Power Down Notification
Proposal for Load Balancing
Multicast Replay Detection Fred Stivers, Texas Instruments
doc.: IEEE /454r0 Bob Beach Symbol Technologies
TGr state machines: normative or informative?
Rekeying Protocol Fix Date: Authors: Month Year
EAPOL-Key Clarifications
Mutliband-60GHz-Location-Capability-Publishing
SA Teardown Protection for w
Keying for Fast Roaming
Overview of Improvements to Key Holder Protocols
Clause 7 Comment Resolutions
TGi Preliminary Agenda
TGi Draft 1 Clause – 8.5 Comments
Overview of Improvements to Key Holder Protocols
Use of EAPOL-Key messages
Reserve Option Contradiction
TGi Draft 1 Clause – 8.5 Comments
Encrypting Management Frames
Proposal for Load Balancing
Comment Resolution Motions
Presentation transcript:

WPA Coordination Changes May 2003 doc.: IEEE 802.11-02/310r0A May 2003 WPA Coordination Changes Changes incorporated in versions 1.4 to 1.8 of the WPA specification. Making similar changes to TGi would keep us aligned. Mike Moreton, Synad Technologies Mike Moreton, Synad Technologies

TKIP TSC Initialisation May 2003 doc.: IEEE 802.11-02/310r0A May 2003 TKIP TSC Initialisation TSCs start at zero. What do replay counters start at if they are always one less than the next expected TSC and are unsigned? It was decided to initialise TSCs to one instead. Mike Moreton, Synad Technologies Mike Moreton, Synad Technologies

May 2003 Request Bit Michael MIC failure messages have the Request bit set, but are not actually requesting a rekey (though the recipient is free to do one if it wishes). Need to make this clear in the text. Mike Moreton, Synad Technologies

Michael Countermeasures Cleanups May 2003 Michael Countermeasures Cleanups Removal of remaining references that indicate a STA should view a received disassociation frame with cause “Michael MIC failure” as if it was itself a MIC failure. As the disassociation frame is not MICed this opened an easy DOS attack. Clarification that the countermeasures only apply to TKIP (not AES) communications, and that they apply to all TKIP communications, not just with the current AP. Mike Moreton, Synad Technologies

No Key Causes Disassociation May 2003 No Key Causes Disassociation STA must disassociate if it receives an encrypted unicast frame when it doesn’t have a key. This may be the case when the STA receives the first frame of the group key handshake. If the AP is faster to respond than the supplicant. The fix is to allow the STA to drop such a frame rather than disassociating. Mike Moreton, Synad Technologies

May 2003 TKIP TSC Order In draft 3.0 the example code placed TSC0 and TSC1 in the frame in the opposite order to which the normative text specified. Most implementations were based on the reference code. WPA has decided to go with the majority. It will make life easier for everyone if we use the same order as WPA. Mike Moreton, Synad Technologies

Pass Phrase Clarification May 2003 Pass Phrase Clarification The definition of which characters are acceptable in a pass phrase does not include space. Mike Moreton, Synad Technologies